Loading HuntDB...

File listing through scripts folder

T
Tennessee Valley Authority
Submitted None
Reported by itssixtynein

Vulnerability Details

Technical details and impact analysis

File and Directory Information Exposure
## Summary: It's possible to list all hidden files that are located within the TVAVirtual.com Sharepoint folder structure. ## Steps To Reproduce: 1. Navigate to TvaVirtual.com 2. Open the pages source code and notice that its build using sharepoint pages. 3. Confirm that you see a listing for /SiteAssets/Scripts/js.cookie.min.js. Click on it to navigate to the page 4. Once https://tvavirtual.com/SiteAssets/Scripts/js.cookie.min.js loads, then remove js.cookie.min.js from the url 5. Confirm that TvaVirtual.com now shows the script folder listing on the page. 6. Remove the extra folder from the url to list the root folder at https://tvavirtual.com/SiteAssets/Forms/AllItems.aspx?RootFolder= 7. Navigate through the directory listing in an attempt to find sensitive files, enumerate publishing users and version history. ## Supporting Material/References: I've attached jpgs showing what is available. You may see a login from [email protected] where I was confirming cross tenant access to the files. ## Impact Attackers can potentially enumerate sensitive information and files that would otherwise be protected

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

File and Directory Information Exposure