Magento Unprotected development files
ID: magento-unprotected-dev-files
Severity: high
Author: TechbrunchFR
Tags: magento
Description
Section titled “Description”Magento version 1.9.2.x includes /dev directories or files that might reveal your passwords and other sensitive information. The /dev directories and files are not protected by default. According to Magento, “these tests are not supposed to end up on production servers”.
YAML Source
Section titled “YAML Source”id: magento-unprotected-dev-files
info: name: Magento Unprotected development files author: TechbrunchFR severity: high description: Magento version 1.9.2.x includes /dev directories or files that might reveal your passwords and other sensitive information. The /dev directories and files are not protected by default. According to Magento, "these tests are not supposed to end up on production servers". reference: - https://support.hypernode.com/en/support/solutions/articles/48001153348-how-to-secure-your-data-using-encryption-and-hashing classification: cpe: cpe:2.3:a:magento:magento:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: magento product: magento shodan-query: http.component:"Magento" tags: magento
http: - method: GET path: - '{{BaseURL}}/dev/tests/functional/credentials.xml.dist' - '{{BaseURL}}/dev/tests/functional/etc/config.xml.dist'
matchers: - type: dsl dsl: - 'contains(body, "Magento")' - 'contains(body, "replace xmlns:xsi=")' - 'contains(body, "<field path=")' - 'contains(tolower(header), "application/xml") || contains(tolower(header), "application/octet-stream")' - 'status_code == 200' condition: and
- type: dsl dsl: - 'contains(body, "Magento")' - 'contains(body, "config xmlns:xsi")' - 'contains(body, "<application>")' - 'contains(body, "<install>")' - 'contains(tolower(header), "application/xml") || contains(tolower(header), "application/octet-stream")' - 'status_code == 200' condition: and# digest: 4a0a00473045022065f1b5089b6de1a7265377525b5e8685bb622d740996c7d5ef9fb85743887515022100cef4505ea53d6c3a18f72a3c313495573a622568e840723653f746c0a53cd344:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/vulnerabilities/magento/magento-unprotected-dev-files.yaml"