Skip to content

service.pwd - Sensitive Information Disclosure

ID: service-pwd

Severity: high

Author: pussycat0x

Tags: exposure,listing,service,edb,misconfig

service.pwd was discovered, which is likely to contain sensitive information.

id: service-pwd
info:
name: service.pwd - Sensitive Information Disclosure
author: pussycat0x
severity: high
description: service.pwd was discovered, which is likely to contain sensitive information.
reference:
- https://www.exploit-db.com/ghdb/7256
metadata:
max-request: 1
tags: exposure,listing,service,edb,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/_vti_pvt/service.pwd"
matchers-condition: and
matchers:
- type: word
words:
- "# -FrontPage-"
part: body
- type: status
status:
- 200
# digest: 4a0a00473045022001bbc2b000bdf6e5f8f9299319ce0629b3624c7a3a24f73db56438f489c1aa5f022100bdfeb14222bfc8d21c09edb57e10b8d5bc2d6ba7832c374e4d57560473abe14d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/service-pwd.yaml"

View on Github