Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Codeception YAML Configuration File Exposure

By kannthu

Low
Vidoc logoVidoc Module
#exposure#devops#codeception#config#cicd
Description

Codeception YAML Configuration File Exposure

What is the "Codeception YAML Configuration File Exposure?"

The "Codeception YAML Configuration File Exposure" module is designed to detect misconfigurations in the Codeception YAML configuration file. Codeception is a popular PHP testing framework used for unit, functional, and acceptance testing. This module specifically targets the exposure of the codeception.yml file, which contains important paths and settings for the Codeception tests.

This module has a severity level of low, indicating that the misconfiguration may not pose a significant risk but should still be addressed to ensure the proper functioning of the Codeception tests.

This module was authored by DhiyaneshDk.

Impact

If the codeception.yml file is exposed, it may allow unauthorized access to sensitive information such as file paths and settings. This can potentially lead to security vulnerabilities or unintended exposure of confidential data.

How does the module work?

The "Codeception YAML Configuration File Exposure" module works by sending an HTTP GET request to the "/codeception.yml" path. It then applies matching conditions to determine if the codeception.yml file is exposed.

The matching conditions for this module are:

- The response body must contain the words "paths:" and "settings:" - The response status code must be 200 (OK)

If both matching conditions are met, the module will report a vulnerability.

Here is an example of the HTTP request sent by the module:

GET /codeception.yml

The module checks if the response body contains the specified words and if the response status code is 200. If both conditions are true, it indicates that the codeception.yml file is exposed.

It is important to address this misconfiguration by properly securing the codeception.yml file to prevent unauthorized access and potential security risks.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/codeception.yml
Matching conditions
word: paths:, settings:and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability