Skip to content

Discover production log files

ID: production-logs

Severity: info

Author: geeknik

Tags: exposure,logs,rails

Production log file was exposed.

id: production-logs
info:
name: Discover production log files
author: geeknik
severity: info
description: Production log file was exposed.
metadata:
max-request: 3
tags: exposure,logs,rails
http:
- method: GET
path:
- "{{BaseURL}}/log/production.log"
- "{{BaseURL}}/logs/production.log"
- "{{BaseURL}}/production.log"
matchers-condition: and
matchers:
- type: word
words:
- "Connecting to database specified by database.yml"
- "Started GET"
condition: and
- type: status
status:
- 200
- type: word
part: header
words:
- "text/html"
negative: true
extractors:
- type: regex
name: last_modified
part: header
regex:
- 'Last-Modified:.*'
# digest: 4b0a00483046022100aaa1c5f610ceba3dd4e9a91b706a006a22161e5cda82376b44254e7b51dd6b89022100d82d7be6c9590ec9ce08d97931c1f159a93dc62504f18b09f5379acb4ba83778:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/logs/production-logs.yaml"

View on Github