Skip to content

Parameters.yml - File Discovery

ID: parameters-config

Severity: high

Author: DhiyaneshDK

Tags: exposure,cloud,devops

Parameters.yml was discovered.

id: parameters-config
info:
name: Parameters.yml - File Discovery
author: DhiyaneshDK
severity: high
description: Parameters.yml was discovered.
reference: https://www.exploit-db.com/ghdb/5986
metadata:
verified: true
max-request: 4
shodan-query: html:"parameters.yml"
tags: exposure,cloud,devops
http:
- method: GET
path:
- "{{BaseURL}}/parameters.yml"
- "{{BaseURL}}/app/config/parameters.yml"
- "{{BaseURL}}/parameters.yml.dist"
- "{{BaseURL}}/app/config/parameters.yml.dist"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- 'parameters:'
- 'database_user'
- 'database_password'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100a7a106040105d6f5f3ecc655ff6ced28122ea2f6ad32ff15441378bf7dcb32a4022100b0d0af882bc178de7d412d9a4d2c935c4c14a447ecbc1370f22348416211ce28:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/configs/parameters-config.yaml"

View on Github