Loading HuntDB...

Directory Indexing on the ████ (https://████/) leads to the backups disclosure and credentials leak

Critical
U
U.S. Dept Of Defense
Submitted None
Reported by sp1d3rs

Vulnerability Details

Technical details and impact analysis

Insecure Storage of Sensitive Information
##Description During poking around `█████████/24` range - █████ looking for the Cisco devices, I came across `█████` which resolved to the https://██████/ While it's a not `.mil` host, it's likely related to the DoD since it hosted in the DoD-controlled ASN. I discovered few critical vulnerabilities here, one of them is exposed backup files via directory listing. ##POC https://███/obj/Debug/ █████ The source code can be found here: https://█████████/obj/Debug/Package/GLOSS2.zip It's zipped backup. The DB credentials exposed here: https://█████/obj/Debug/Package/GLOSS2.SetParameters.xml ███ ##Suggested fix Disable directory indexing, restrict access to the sensitive files, and change credentials as defense-in-depth measure. ## Impact Source code & DB credentials leakage. Attacker can use it to compromise the resource.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Insecure Storage of Sensitive Information