nuclei-templates/http/exposures/files/svn-wc-db.yaml

40 lines
1.1 KiB
YAML

id: svn-wc-db
info:
name: SVN wc.db File Exposure
author: Hardik-Solanki,R12W4N
severity: medium
reference:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
- https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
- https://infosecwriteups.com/indias-aadhar-card-source-code-disclosure-via-exposed-svn-wc-db-c05519ea7761
metadata:
verified: true
max-request: 2
google-query: intitle:"index of" "wc.db"
tags: msf,exposure,svn,config,files
http:
- method: GET
path:
- "{{BaseURL}}/.svn/wc.db"
- "{{BaseURL}}/wc.db"
stop-at-first-match: true
max-size: 10000
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'SQLite format'
- 'WCROOT'
condition: and
- type: status
status:
- 200
# digest: 490a004630440220487cd7c2b74c2fb87432755968bb2d82ba6666e122bcfb37b07fb03877464c230220164ec3da59541851b9224b7b047481af075e4031033569d78500f7ff861b7c22:922c64590222798bb761d5b6d8e72950