Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

PHP-FPM Config file disclosure

By kannthu

Low
Vidoc logoVidoc Module
#config#exposure#php
Description

What is the "PHP-FPM Config file disclosure?"

The "PHP-FPM Config file disclosure" module is designed to detect a misconfiguration in the PHP-FPM software. PHP-FPM is a FastCGI Process Manager for PHP that is commonly used to improve the performance and scalability of PHP-based websites. This module focuses on identifying a specific vulnerability related to the exposure of the PHP-FPM configuration file.

The severity of this vulnerability is classified as low, indicating that it may not pose a significant threat but should still be addressed to ensure the security of the PHP-FPM installation.

This module was authored by sheikhrishad.

Impact

If the PHP-FPM configuration file is exposed, it can potentially reveal sensitive information about the server setup, including pool definitions and other FPM configuration details. This information can be leveraged by attackers to gain insights into the server's architecture and potentially exploit any weaknesses or misconfigurations.

How does the module work?

The "PHP-FPM Config file disclosure" module operates by sending an HTTP GET request to the "/php-fpm.conf" path. It then applies two matching conditions to determine if the vulnerability is present:

    - The module checks if the response body contains the words "FPM Configuration" and "Pool Definitions". This indicates that the PHP-FPM configuration file has been exposed. - The module also verifies that the HTTP response status code is 200, indicating a successful request.

If both conditions are met, the module reports the vulnerability, highlighting the potential exposure of the PHP-FPM configuration file.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/php-fpm.conf
Matching conditions
word: FPM Configuration, Pool Definitionsand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability