File listing through scripts folder
T
Tennessee Valley Authority
Submitted None
Actions:
Reported by
itssixtynein
Vulnerability Details
Technical details and impact analysis
## Summary:
It's possible to list all hidden files that are located within the TVAVirtual.com Sharepoint folder structure.
## Steps To Reproduce:
1. Navigate to TvaVirtual.com
2. Open the pages source code and notice that its build using sharepoint pages.
3. Confirm that you see a listing for /SiteAssets/Scripts/js.cookie.min.js. Click on it to navigate to the page
4. Once https://tvavirtual.com/SiteAssets/Scripts/js.cookie.min.js loads, then remove js.cookie.min.js from the url
5. Confirm that TvaVirtual.com now shows the script folder listing on the page.
6. Remove the extra folder from the url to list the root folder at https://tvavirtual.com/SiteAssets/Forms/AllItems.aspx?RootFolder=
7. Navigate through the directory listing in an attempt to find sensitive files, enumerate publishing users and version history.
## Supporting Material/References:
I've attached jpgs showing what is available. You may see a login from [email protected] where I was confirming cross tenant access to the files.
## Impact
Attackers can potentially enumerate sensitive information and files that would otherwise be protected
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
File and Directory Information Exposure