Loading HuntDB...

Information Disclosure .htaccess accesible for public

Low
B
Basecamp
Submitted None
Reported by aloneh1

Vulnerability Details

Technical details and impact analysis

Hello team! While doing a preliminary recon on the sub domain of "launchpad.37signals.com" I've come across a few sensitive files that should not be facing the public web; I'll leave you a list organized by criticality and some proof. Information disclosure of path .htaccess on the subdomain of https://launchpad.37signals.com/ POC url : https://_domainkey.launchpad.37signals.com/.htaccess Medium priority .htaccess file for https://_domainkey.launchpad.37signals.com Options +ExecCGI +MultiViews +FollowSymLinks AddHandler cgi-script .cgi php_value include_path "include:../include" RewriteEngine on RewriteCond sprockets.js !-f RewriteRule ^sprockets\.js /nph-sprockets.cgi [P,L] # Uncomment the next line to enable Sprockets caching # SetEnv sprockets_generate_output_file true step to reproduce : go to the url :https://_domainkey.launchpad.37signals.com/ after add .htacces to the endpoint of url like https://_domainkey.launchpad.37signals.com/.htaccess the page says download the content of .htaccess as a popup. ## Impact The publicly accessible .htaccess might be serious as long as those credentials are really being used somewhere (and it seems to me the DBMS isn't facing the public internet anyway). The real impact is that finding such files always grabs the attention of a threat actor, which might give up not so easily influenced by the fact that there might be "more".

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted