Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Acunetix - [Possible] Backup Source Code Detected #3

Open
goestin820 opened this issue Mar 5, 2024 · 0 comments
Open

Acunetix - [Possible] Backup Source Code Detected #3

goestin820 opened this issue Mar 5, 2024 · 0 comments
Labels
bug Something isn't working

Comments

@goestin820
Copy link
Owner

Target URLhttp://testphp.vulnweb.com
Target Descriptiontest
SeverityHigh

Affects

http://testphp.vulnweb.com/index.zip

Attack Details

This file was found using the pattern ${fileName}.zip.
Original filename: index.php

HTTP Request

GET /index.zip HTTP/1.1
Range: bytes=0-99999
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,br
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Host: testphp.vulnweb.com
Connection: Keep-alive

Vulnerability Description

A possible backup file was found on your web-server. These files are usually created by developers to backup their work.

Impact

Backup files can contain script sources, configuration files or other sensitive information that may help an malicious user to prepare more advanced attacks.

Remediation

Remove the file(s) if they are not required on your website. As an additional step, it is recommended to implement a security policy within your organization to disallow creation of backup files in directories accessible from the web.
References:
@goestin820 goestin820 added the bug Something isn't working label Mar 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

1 participant