Skip to content

Apdisk - File Disclosure

ID: apdisk-disclosure

Severity: low

Author: DhiyaneshDk

Tags: exposure,files,apdisk

Apdisk internal file is exposed.

id: apdisk-disclosure
info:
name: Apdisk - File Disclosure
author: DhiyaneshDk
severity: low
description: Apdisk internal file is exposed.
reference:
- https://discussions.apple.com/thread/250354761
metadata:
verified: true
max-request: 1
shodan-query: html:"Apdisk"
tags: exposure,files,apdisk
http:
- method: GET
path:
- "{{BaseURL}}/.apdisk"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<plist version="
- "<key>"
- "<string>"
condition: and
- type: word
part: header
words:
- "text/xml"
# digest: 4b0a00483046022100d14d84d841c6ac326c3c54ebb82264b6b8e11354d21f7ce3a6e428e0e65163cb022100ef55aa68265feff3c93cf0e96b0cbb3178049cb5083df1d75b00cdd15b6ff98c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/apdisk-disclosure.yaml"

View on Github