FTP Deployment Config File - Exposure
ID: deployment-ini
Severity: medium
Author: Michal Mikolas (nanuqcz)
Tags: config,exposure,dg
Description
Section titled “Description”Config file for “FTP deployment” utility usually contains server’s FTP credentials in plain text.
YAML Source
Section titled “YAML Source”id: deployment-ini
info: name: FTP Deployment Config File - Exposure author: Michal Mikolas (nanuqcz) severity: medium description: | Config file for "FTP deployment" utility usually contains server's FTP credentials in plain text. remediation: | Delete the config file from server & add it to `ignore` section of the deployment file. Or block access to the file using `.htaccess` on the server. reference: - https://github.com/dg/ftp-deployment metadata: max-request: 12 vendor: dg product: "ftp-deployment" tags: config,exposure,dg
http: - method: GET path: - "{{BaseURL}}{{paths}}" payloads: paths: - "/deployment.ini" - "/deploy.ini" - "/production.ini" - "/prod.ini" - "/deployment.production.ini" - "/deployment.prod.ini" - "/deploy.production.ini" - "/deploy.prod.ini" - "/server.ini" - "/ftp.ini" - "/ftps.ini" - "/sftp.ini"
stop-at-first-match: true
matchers: - type: regex regex: - "^remote\\s*=\\s*" - '^\[(.*?)\]$' condition: and# digest: 4a0a004730450220613baf3e382a6bae089ddcc2df862df9d74c8170e0d1ab1ef9f5e652ae830907022100a79c5775c009ca5e9e62b0d4690d1e77ccae1bf50c99d2771b230e097b1e4312:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposures/configs/deployment-ini.yaml"