nuclei-templates/http/exposures/configs/phpinfo-files.yaml

66 lines
1.9 KiB
YAML

id: phpinfo-files
info:
name: PHPinfo Page - Detect
author: pdteam,daffainfo,meme-lord,dhiyaneshDK,wabafet,mastercho
severity: low
description: |
PHPinfo page was detected. The output of the phpinfo() command can reveal sensitive and detailed PHP environment information.
remediation: Remove PHP Info pages from publicly accessible sites, or restrict access to authorized users only.
classification:
cwe-id: CWE-200
metadata:
max-request: 25
tags: config,exposure,phpinfo
http:
- method: GET
path:
- "{{BaseURL}}/php.php"
- "{{BaseURL}}/php2.php"
- "{{BaseURL}}/phpinfo.php"
- "{{BaseURL}}/info.php"
- "{{BaseURL}}/infophp.php"
- "{{BaseURL}}/php_info.php"
- "{{BaseURL}}/test.php"
- "{{BaseURL}}/i.php"
- "{{BaseURL}}/p.php"
- "{{BaseURL}}/pi.php"
- "{{BaseURL}}/asdf.php"
- "{{BaseURL}}/pinfo.php"
- "{{BaseURL}}/phpversion.php"
- "{{BaseURL}}/time.php"
- "{{BaseURL}}/index.php"
- "{{BaseURL}}/temp.php"
- "{{BaseURL}}/old_phpinfo.php"
- "{{BaseURL}}/infos.php"
- "{{BaseURL}}/linusadmin-phpinfo.php"
- "{{BaseURL}}/php-info.php"
- "{{BaseURL}}/dashboard/phpinfo.php"
- "{{BaseURL}}/_profiler/phpinfo.php"
- "{{BaseURL}}/_profiler/phpinfo"
- "{{BaseURL}}/?phpinfo=1"
- "{{BaseURL}}/l.php?act=phpinfo"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "PHP Extension"
- "PHP Version"
condition: and
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '>PHP Version <\/td><td class="v">([0-9.]+)'
# digest: 4b0a004830460221009b7c20b1db6690a5efc202e5e4183334cc2cac71afd4ef5031bfcc1f1d3a00df022100ceb05aa6e4dd37a4bd7bfde8f170a9a1a5d827f94e1e405002e5dfe9d6484d38:922c64590222798bb761d5b6d8e72950