nuclei-templates/http/exposures/files/svn-wc-db.yaml

39 lines
1.1 KiB
YAML

id: svn-wc-db
info:
name: SVN wc.db File Exposure
author: Hardik-Solanki,R12W4N
severity: medium
description: SVN wc.db file is exposed.
reference:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
- https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/svn_wcdb_scanner.rb
- https://infosecwriteups.com/indias-aadhar-card-source-code-disclosure-via-exposed-svn-wc-db-c05519ea7761
metadata:
verified: true
max-request: 2
google-query: intitle:"index of" "wc.db"
tags: msf,exposure,svn,config,files
http:
- method: GET
path:
- "{{BaseURL}}/.svn/wc.db"
- "{{BaseURL}}/wc.db"
stop-at-first-match: true
max-size: 10000
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'SQLite format'
- 'WCROOT'
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502207b3da2350ab0dfe42fea1b9232ea351923200d1ea45bd9d3ae7a0c20ab8b1a5102210094ee3f8bfe328ad9a92ca4f3473a4e14a0dfe5e9f2a598b38282b826b31c7f38:922c64590222798bb761d5b6d8e72950