Loading HuntDB...

Unauthenticated phpinfo()files could lead to ability file read at h3f6.n1.ips.mtn.co.ug

Medium
M
MTN Group
Submitted None
Reported by offensiveops

Vulnerability Details

Technical details and impact analysis

Improper Access Control - Generic
## Summary Many PHP installation tutorials instruct the user to create a PHP file that calls the PHP function 'phpinfo()' for debugging purposes, and various PHP applications may also include such a file by default. By accessing it, a remote attacker can discover a large amount of information about the remote web server configuration to help conduct further attacks, including : * root/vps of the web server, operating system and PHP components * Details of the PHP configuration * Loaded PHP extensions with their configurations * Server environment variables. **Proof On Concepts:** http://h3f6.n1.ips.mtn.co.ug/info.php ``` Linux uggogamesdb 5.4.17-2136.323.8.2.el8uek.x86_64 #2 SMP Tue Sep 19 23:45:56 PDT 2023 x86_64 ``` ## Steps to Reproduce * Visit the target scope is http://h3f6.n1.ips.mtn.co.ug * You can used `burp-suite-intruder` for finding sensitive directory * And now we found a directory is `info.php` * Let's see opened in our browser is directory https://h3f6.n1.ips.mtn.co.ug/phpinfo.php * You can see this page can be view without authenticate ## Suggested Mitigation/Remediation Actions Remove the affected file(s). http://php.net/manual/en/function.phpinfo.php ## Impact The remote web server contains a PHP script that is prone to an information disclosure attack.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Access Control - Generic