Skip to content

Php.ini File Disclosure

ID: php-ini

Severity: low

Author: geeknik,DhiyaneshDK

Tags: config,exposure,files

php.ini file is exposed.

id: php-ini
info:
name: Php.ini File Disclosure
author: geeknik,DhiyaneshDK
severity: low
description: php.ini file is exposed.
reference: https://www.php.net/manual/en/configuration.file.php
classification:
cpe: cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: php
product: php
shodan-query: php.ini
tags: config,exposure,files
http:
- method: GET
path:
- "{{BaseURL}}/php.ini"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "[PHP]"
- "short_open_tag"
- "safe_mode"
- "expose_php"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402200a4a36ccfa8bad07bd3bd99be7810907ecb3a13a4544a4fb03e572a184f4863402207077f4917fa244de1f67671dfd1a1b4331a8026d0eeefbc098a345bdd9b91020:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/php-ini.yaml"

View on Github