Skip to content

Pantheon upstream.yml Disclosure

ID: pantheon-upstream

Severity: low

Author: DhiyaneshDK

Tags: exposure,devops,patheon,config,files

Public Pantheon YAML Configuration Files might include sensitive info

id: pantheon-upstream
info:
name: Pantheon upstream.yml Disclosure
author: DhiyaneshDK
severity: low
description: Public Pantheon YAML Configuration Files might include sensitive info
reference:
- https://pantheon.io/docs/pantheon-yml
metadata:
verified: true
max-request: 1
google-query: intitle:"index of" "pantheon.upstream.yml"
tags: exposure,devops,patheon,config,files
http:
- method: GET
path:
- "{{BaseURL}}/pantheon.upstream.yml"
matchers-condition: and
matchers:
- type: word
words:
- 'database:'
- 'protected_web_paths:'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100901889d3ceb3aac42b63a48c37d5cbdf3cdefb46a9795e4475d973a089164c6f022100fbc74454f3d0fb9c6e5b04041e72fed5e50b49468aa3655b9e6511d649575a12:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/pantheon-upstream.yaml"

View on Github