Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "settings.php information disclosure" module is designed to detect a potential vulnerability in the settings.php file of a website. This module targets websites that use a settings.php file to store sensitive information, such as database credentials. The severity of this vulnerability is classified as medium.
This module was authored by sheikhrishad.
If the settings.php file is exposed, it can potentially lead to unauthorized access to sensitive information, such as database credentials. This can result in data breaches, unauthorized modifications, or even complete compromise of the website.
The "settings.php information disclosure" module works by sending HTTP requests to specific paths where the settings.php file might be stored. It then applies matching conditions to determine if the file contains sensitive information, such as database names or credentials.
For example, the module might send a GET request to paths like "/settings.php.bak" or "/settings.php.dist". It checks if the response status is 200 (OK) and if the response body contains specific keywords related to database information.
The matching conditions used in this module are:
- Check if the response body contains the words "DB_NAME" or "DB". - Check if the response status is 200 (OK).If both conditions are met, the module reports a potential vulnerability.