Skip to content

Application Setting file disclosure

ID: appsettings-file-disclosure

Severity: high

Author: DhiyaneshDK,tess

Tags: exposure,files

appsetting.json file discloses the DB connection strings containing sensitive information.

id: appsettings-file-disclosure
info:
name: Application Setting file disclosure
author: DhiyaneshDK,tess
severity: high
description: |
appsetting.json file discloses the DB connection strings containing sensitive information.
reference:
- https://twitter.com/hacker_/status/1518003548855930882?s=20&t=BVauK0yUjVl5yL7rwy0Eag
metadata:
verified: true
max-request: 2
tags: exposure,files
http:
- method: GET
path:
- "{{BaseURL}}/appsettings.json"
- "{{BaseURL}}/appsettings.Production.json"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
words:
- "ConnectionStrings"
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a004730450220055d2543eb65b886a83bdb728dd11fd6acb8c5b6d5c7ee26e47e09e080697c4c022100e7f0aafd7e75842b9e8de61f09bb2cadc4b761030898b8dde8005257859c01d9:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/appsettings-file-disclosure.yaml"

View on Github