Skip to content

Icecast Config - File Disclosure

ID: icecast-config

Severity: low

Author: DhiyaneshDk

Tags: exposure,icecast,config,files

Icecast Config file is exposed.

id: icecast-config
info:
name: Icecast Config - File Disclosure
author: DhiyaneshDk
severity: low
description: |
Icecast Config file is exposed.
reference:
- https://icecast.org/docs/icecast-trunk/config_file/
metadata:
verified: true
max-request: 1
fofa-query: body="icecast.xml"
tags: exposure,icecast,config,files
http:
- method: GET
path:
- '{{BaseURL}}/icecast.xml'
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "application/xml")'
- 'contains_all(body, "<hostname>","<fileserve>")'
condition: and
# digest: 4a0a00473045022100cbf57945159c9291035012ab5ae02ba830e7f8dfb2e232d258b7f4747b8bac64022013dc5b9bf0e2627eec62c24e34fb78516191d972978bcf9a0d3520a2ff37853b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/icecast-config.yaml"

View on Github