@zerothreatai/vulnerability-registry 3.0.0 → 4.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -0
- package/dist/categories/configuration.js +501 -0
- package/dist/categories/injection.js +34 -0
- package/dist/categories/sensitive-paths.js +84 -0
- package/dist/categories/ssrf.js +11 -0
- package/dist/categories/xss.js +15 -0
- package/dist/category.d.ts +6 -0
- package/dist/category.js +15 -0
- package/dist/error-codes.d.ts +20 -0
- package/dist/error-codes.js +20 -0
- package/dist/index.d.ts +9 -1
- package/dist/index.js +5 -1
- package/dist/scanner.d.ts +6 -0
- package/dist/scanner.js +22 -0
- package/dist/types.d.ts +2 -0
- package/dist-cjs/categories/authentication.js +17 -0
- package/dist-cjs/categories/configuration.js +501 -0
- package/dist-cjs/categories/injection.js +34 -0
- package/dist-cjs/categories/sensitive-paths.js +84 -0
- package/dist-cjs/categories/ssrf.js +11 -0
- package/dist-cjs/categories/xss.js +15 -0
- package/dist-cjs/category.js +18 -0
- package/dist-cjs/error-codes.js +20 -0
- package/dist-cjs/index.js +7 -1
- package/dist-cjs/scanner.js +25 -0
- package/package.json +1 -1
- package/src/categories/authentication.js +54 -40
- package/src/categories/authentication.ts +134 -117
- package/src/categories/configuration.js +990 -114
- package/src/categories/configuration.ts +1625 -1104
- package/src/categories/injection.js +105 -74
- package/src/categories/injection.ts +129 -95
- package/src/categories/sensitive-paths.js +255 -174
- package/src/categories/sensitive-paths.ts +84 -0
- package/src/categories/ssrf.js +36 -28
- package/src/categories/ssrf.ts +11 -0
- package/src/categories/xss.js +47 -35
- package/src/categories/xss.ts +15 -0
- package/src/category.ts +16 -0
- package/src/error-codes.d.ts +38 -0
- package/src/error-codes.js +41 -6
- package/src/error-codes.ts +25 -5
- package/src/index.js +33 -48
- package/src/index.ts +20 -14
- package/src/scanner.ts +23 -0
- package/src/types.d.ts +2 -0
- package/src/types.js +1 -2
- package/src/types.ts +4 -2
- package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
|
@@ -1,23 +1,21 @@
|
|
|
1
|
-
"use strict";
|
|
2
1
|
/**
|
|
3
2
|
* Vulnerability Registry - Sensitive Path Vulnerabilities
|
|
4
3
|
*
|
|
5
4
|
* Definitions for all sensitive path exposure vulnerabilities
|
|
6
5
|
* detected by the sensitive-path-scout scanner.
|
|
7
6
|
*/
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
const error_codes_js_1 = require("../error-codes.js");
|
|
11
|
-
exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
7
|
+
import { VulnerabilityCode } from '../error-codes.js';
|
|
8
|
+
export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
12
9
|
// ========================================
|
|
13
10
|
// CRITICAL - CREDENTIAL EXPOSURE
|
|
14
11
|
// ========================================
|
|
15
|
-
[
|
|
12
|
+
[VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
|
|
16
13
|
id: 88,
|
|
17
|
-
code:
|
|
14
|
+
code: VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
|
|
18
15
|
title: 'AWS Credentials Exposed',
|
|
19
16
|
description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
|
|
20
17
|
severity: 'critical',
|
|
18
|
+
levelId: 1,
|
|
21
19
|
category: 'information_disclosure',
|
|
22
20
|
scanner: 'sensitive-path-scout',
|
|
23
21
|
cvss: {
|
|
@@ -34,12 +32,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
34
32
|
],
|
|
35
33
|
remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
|
|
36
34
|
},
|
|
37
|
-
[
|
|
35
|
+
[VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
|
|
38
36
|
id: 89,
|
|
39
|
-
code:
|
|
37
|
+
code: VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
|
|
40
38
|
title: 'SSH Private Key Exposed',
|
|
41
39
|
description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
|
|
42
40
|
severity: 'critical',
|
|
41
|
+
levelId: 1,
|
|
43
42
|
category: 'information_disclosure',
|
|
44
43
|
scanner: 'sensitive-path-scout',
|
|
45
44
|
cvss: {
|
|
@@ -55,12 +54,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
55
54
|
],
|
|
56
55
|
remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
|
|
57
56
|
},
|
|
58
|
-
[
|
|
57
|
+
[VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
|
|
59
58
|
id: 90,
|
|
60
|
-
code:
|
|
59
|
+
code: VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
|
|
61
60
|
title: 'SSL/TLS Private Key Exposed',
|
|
62
61
|
description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
|
|
63
62
|
severity: 'critical',
|
|
63
|
+
levelId: 1,
|
|
64
64
|
category: 'cryptographic',
|
|
65
65
|
scanner: 'sensitive-path-scout',
|
|
66
66
|
cvss: {
|
|
@@ -76,12 +76,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
76
76
|
],
|
|
77
77
|
remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
|
|
78
78
|
},
|
|
79
|
-
[
|
|
79
|
+
[VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
|
|
80
80
|
id: 91,
|
|
81
|
-
code:
|
|
81
|
+
code: VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
|
|
82
82
|
title: 'Rails Master Key Exposed',
|
|
83
83
|
description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
|
|
84
84
|
severity: 'critical',
|
|
85
|
+
levelId: 1,
|
|
85
86
|
category: 'information_disclosure',
|
|
86
87
|
scanner: 'sensitive-path-scout',
|
|
87
88
|
cvss: {
|
|
@@ -97,12 +98,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
97
98
|
],
|
|
98
99
|
remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
|
|
99
100
|
},
|
|
100
|
-
[
|
|
101
|
+
[VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
|
|
101
102
|
id: 92,
|
|
102
|
-
code:
|
|
103
|
+
code: VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
|
|
103
104
|
title: 'Terraform State File Exposed',
|
|
104
105
|
description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
|
|
105
106
|
severity: 'critical',
|
|
107
|
+
levelId: 1,
|
|
106
108
|
category: 'information_disclosure',
|
|
107
109
|
scanner: 'sensitive-path-scout',
|
|
108
110
|
cvss: {
|
|
@@ -118,12 +120,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
118
120
|
],
|
|
119
121
|
remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
|
|
120
122
|
},
|
|
121
|
-
[
|
|
123
|
+
[VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
|
|
122
124
|
id: 93,
|
|
123
|
-
code:
|
|
125
|
+
code: VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
|
|
124
126
|
title: 'Kubernetes Config Exposed',
|
|
125
127
|
description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
|
|
126
128
|
severity: 'critical',
|
|
129
|
+
levelId: 1,
|
|
127
130
|
category: 'information_disclosure',
|
|
128
131
|
scanner: 'sensitive-path-scout',
|
|
129
132
|
cvss: {
|
|
@@ -139,12 +142,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
139
142
|
],
|
|
140
143
|
remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
|
|
141
144
|
},
|
|
142
|
-
[
|
|
145
|
+
[VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
|
|
143
146
|
id: 94,
|
|
144
|
-
code:
|
|
147
|
+
code: VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
|
|
145
148
|
title: 'HashiCorp Vault Secret Exposed',
|
|
146
149
|
description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
|
|
147
150
|
severity: 'critical',
|
|
151
|
+
levelId: 1,
|
|
148
152
|
category: 'information_disclosure',
|
|
149
153
|
scanner: 'sensitive-path-scout',
|
|
150
154
|
cvss: {
|
|
@@ -163,12 +167,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
163
167
|
// ========================================
|
|
164
168
|
// HIGH - SOURCE CODE & CONFIG EXPOSURE
|
|
165
169
|
// ========================================
|
|
166
|
-
[
|
|
170
|
+
[VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
|
|
167
171
|
id: 95,
|
|
168
|
-
code:
|
|
172
|
+
code: VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
|
|
169
173
|
title: 'Git Repository Exposed',
|
|
170
174
|
description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
|
|
171
175
|
severity: 'high',
|
|
176
|
+
levelId: 2,
|
|
172
177
|
category: 'information_disclosure',
|
|
173
178
|
scanner: 'sensitive-path-scout',
|
|
174
179
|
cvss: {
|
|
@@ -184,12 +189,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
184
189
|
],
|
|
185
190
|
remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
|
|
186
191
|
},
|
|
187
|
-
[
|
|
192
|
+
[VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
|
|
188
193
|
id: 96,
|
|
189
|
-
code:
|
|
194
|
+
code: VulnerabilityCode.SENS_HIGH_ENV_FILE,
|
|
190
195
|
title: 'Environment File Exposed',
|
|
191
196
|
description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
|
|
192
197
|
severity: 'high',
|
|
198
|
+
levelId: 2,
|
|
193
199
|
category: 'information_disclosure',
|
|
194
200
|
scanner: 'sensitive-path-scout',
|
|
195
201
|
cvss: {
|
|
@@ -205,12 +211,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
205
211
|
],
|
|
206
212
|
remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
|
|
207
213
|
},
|
|
208
|
-
[
|
|
214
|
+
[VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
|
|
209
215
|
id: 97,
|
|
210
|
-
code:
|
|
216
|
+
code: VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
|
|
211
217
|
title: 'WordPress Configuration File Exposed',
|
|
212
218
|
description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
|
|
213
219
|
severity: 'high',
|
|
220
|
+
levelId: 2,
|
|
214
221
|
category: 'information_disclosure',
|
|
215
222
|
scanner: 'sensitive-path-scout',
|
|
216
223
|
cvss: {
|
|
@@ -226,12 +233,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
226
233
|
],
|
|
227
234
|
remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
|
|
228
235
|
},
|
|
229
|
-
[
|
|
236
|
+
[VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
|
|
230
237
|
id: 98,
|
|
231
|
-
code:
|
|
238
|
+
code: VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
|
|
232
239
|
title: 'Spring Boot Actuator Endpoints Exposed',
|
|
233
240
|
description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
|
|
234
241
|
severity: 'high',
|
|
242
|
+
levelId: 2,
|
|
235
243
|
category: 'information_disclosure',
|
|
236
244
|
scanner: 'sensitive-path-scout',
|
|
237
245
|
cvss: {
|
|
@@ -248,12 +256,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
248
256
|
],
|
|
249
257
|
remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
|
|
250
258
|
},
|
|
251
|
-
[
|
|
259
|
+
[VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
|
|
252
260
|
id: 99,
|
|
253
|
-
code:
|
|
261
|
+
code: VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
|
|
254
262
|
title: 'Spring Boot Heapdump Exposed',
|
|
255
263
|
description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
|
|
256
264
|
severity: 'critical',
|
|
265
|
+
levelId: 1,
|
|
257
266
|
category: 'information_disclosure',
|
|
258
267
|
scanner: 'sensitive-path-scout',
|
|
259
268
|
cvss: {
|
|
@@ -269,12 +278,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
269
278
|
],
|
|
270
279
|
remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
|
|
271
280
|
},
|
|
272
|
-
[
|
|
281
|
+
[VulnerabilityCode.SENS_HIGH_PHPINFO]: {
|
|
273
282
|
id: 100,
|
|
274
|
-
code:
|
|
283
|
+
code: VulnerabilityCode.SENS_HIGH_PHPINFO,
|
|
275
284
|
title: 'PHP Info Page Exposed',
|
|
276
285
|
description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
|
|
277
286
|
severity: 'medium',
|
|
287
|
+
levelId: 3,
|
|
278
288
|
category: 'information_disclosure',
|
|
279
289
|
scanner: 'sensitive-path-scout',
|
|
280
290
|
cvss: {
|
|
@@ -290,12 +300,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
290
300
|
],
|
|
291
301
|
remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
|
|
292
302
|
},
|
|
293
|
-
[
|
|
303
|
+
[VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
|
|
294
304
|
id: 101,
|
|
295
|
-
code:
|
|
305
|
+
code: VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
|
|
296
306
|
title: 'Laravel Debug Mode Enabled',
|
|
297
307
|
description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
|
|
298
308
|
severity: 'high',
|
|
309
|
+
levelId: 2,
|
|
299
310
|
category: 'information_disclosure',
|
|
300
311
|
scanner: 'sensitive-path-scout',
|
|
301
312
|
cvss: {
|
|
@@ -311,12 +322,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
311
322
|
],
|
|
312
323
|
remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
|
|
313
324
|
},
|
|
314
|
-
[
|
|
325
|
+
[VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
|
|
315
326
|
id: 102,
|
|
316
|
-
code:
|
|
327
|
+
code: VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
|
|
317
328
|
title: 'GraphQL Introspection Enabled',
|
|
318
329
|
description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
|
|
319
330
|
severity: 'medium',
|
|
331
|
+
levelId: 3,
|
|
320
332
|
category: 'information_disclosure',
|
|
321
333
|
scanner: 'sensitive-path-scout',
|
|
322
334
|
cvss: {
|
|
@@ -332,12 +344,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
332
344
|
],
|
|
333
345
|
remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
|
|
334
346
|
},
|
|
335
|
-
[
|
|
347
|
+
[VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
|
|
336
348
|
id: 103,
|
|
337
|
-
code:
|
|
349
|
+
code: VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
|
|
338
350
|
title: 'Database Backup File Exposed',
|
|
339
351
|
description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
|
|
340
352
|
severity: 'critical',
|
|
353
|
+
levelId: 1,
|
|
341
354
|
category: 'information_disclosure',
|
|
342
355
|
scanner: 'sensitive-path-scout',
|
|
343
356
|
cvss: {
|
|
@@ -356,12 +369,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
356
369
|
// ========================================
|
|
357
370
|
// MEDIUM - API & SERVICE EXPOSURE
|
|
358
371
|
// ========================================
|
|
359
|
-
[
|
|
372
|
+
[VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
|
|
360
373
|
id: 104,
|
|
361
|
-
code:
|
|
374
|
+
code: VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
|
|
362
375
|
title: 'Swagger/OpenAPI Documentation Exposed',
|
|
363
376
|
description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
|
|
364
377
|
severity: 'low',
|
|
378
|
+
levelId: 4,
|
|
365
379
|
category: 'information_disclosure',
|
|
366
380
|
scanner: 'sensitive-path-scout',
|
|
367
381
|
cvss: {
|
|
@@ -377,12 +391,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
377
391
|
],
|
|
378
392
|
remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
|
|
379
393
|
},
|
|
380
|
-
[
|
|
394
|
+
[VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
|
|
381
395
|
id: 105,
|
|
382
|
-
code:
|
|
396
|
+
code: VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
|
|
383
397
|
title: 'Prometheus Metrics Endpoint Exposed',
|
|
384
398
|
description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
|
|
385
399
|
severity: 'medium',
|
|
400
|
+
levelId: 3,
|
|
386
401
|
category: 'information_disclosure',
|
|
387
402
|
scanner: 'sensitive-path-scout',
|
|
388
403
|
cvss: {
|
|
@@ -398,12 +413,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
398
413
|
],
|
|
399
414
|
remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
|
|
400
415
|
},
|
|
401
|
-
[
|
|
416
|
+
[VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
|
|
402
417
|
id: 106,
|
|
403
|
-
code:
|
|
418
|
+
code: VulnerabilityCode.SENS_MED_ADMIN_PANEL,
|
|
404
419
|
title: 'Admin Panel Publicly Accessible',
|
|
405
420
|
description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
|
|
406
421
|
severity: 'medium',
|
|
422
|
+
levelId: 3,
|
|
407
423
|
category: 'access_control',
|
|
408
424
|
scanner: 'sensitive-path-scout',
|
|
409
425
|
cvss: {
|
|
@@ -419,12 +435,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
419
435
|
],
|
|
420
436
|
remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
|
|
421
437
|
},
|
|
422
|
-
[
|
|
438
|
+
[VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
|
|
423
439
|
id: 107,
|
|
424
|
-
code:
|
|
440
|
+
code: VulnerabilityCode.SENS_MED_SOURCE_MAP,
|
|
425
441
|
title: 'JavaScript Source Maps Exposed',
|
|
426
442
|
description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
|
|
427
443
|
severity: 'low',
|
|
444
|
+
levelId: 4,
|
|
428
445
|
category: 'information_disclosure',
|
|
429
446
|
scanner: 'sensitive-path-scout',
|
|
430
447
|
cvss: {
|
|
@@ -443,12 +460,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
443
460
|
// ========================================
|
|
444
461
|
// EXTENDED SENSITIVE PATH EXPOSURES
|
|
445
462
|
// ========================================
|
|
446
|
-
[
|
|
463
|
+
[VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
|
|
447
464
|
id: 203,
|
|
448
|
-
code:
|
|
465
|
+
code: VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
|
|
449
466
|
title: 'Un Protected Config JSON',
|
|
450
467
|
description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
451
468
|
severity: 'medium',
|
|
469
|
+
levelId: 3,
|
|
452
470
|
category: 'information_disclosure',
|
|
453
471
|
scanner: 'sensitive-path-scout',
|
|
454
472
|
cvss: {
|
|
@@ -464,12 +482,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
464
482
|
],
|
|
465
483
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
466
484
|
},
|
|
467
|
-
[
|
|
485
|
+
[VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
|
|
468
486
|
id: 109,
|
|
469
|
-
code:
|
|
487
|
+
code: VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
|
|
470
488
|
title: 'Web Server Configuration File Detected',
|
|
471
489
|
description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
472
490
|
severity: 'high',
|
|
491
|
+
levelId: 2,
|
|
473
492
|
category: 'information_disclosure',
|
|
474
493
|
scanner: 'sensitive-path-scout',
|
|
475
494
|
cvss: {
|
|
@@ -485,12 +504,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
485
504
|
],
|
|
486
505
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
487
506
|
},
|
|
488
|
-
[
|
|
507
|
+
[VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
|
|
489
508
|
id: 110,
|
|
490
|
-
code:
|
|
509
|
+
code: VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
|
|
491
510
|
title: 'Appsettings JSON Exposed',
|
|
492
511
|
description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
493
512
|
severity: 'high',
|
|
513
|
+
levelId: 2,
|
|
494
514
|
category: 'information_disclosure',
|
|
495
515
|
scanner: 'sensitive-path-scout',
|
|
496
516
|
cvss: {
|
|
@@ -506,12 +526,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
506
526
|
],
|
|
507
527
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
508
528
|
},
|
|
509
|
-
[
|
|
529
|
+
[VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
|
|
510
530
|
id: 111,
|
|
511
|
-
code:
|
|
531
|
+
code: VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
|
|
512
532
|
title: 'Spring Config Exposed',
|
|
513
533
|
description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
514
534
|
severity: 'high',
|
|
535
|
+
levelId: 2,
|
|
515
536
|
category: 'information_disclosure',
|
|
516
537
|
scanner: 'sensitive-path-scout',
|
|
517
538
|
cvss: {
|
|
@@ -527,12 +548,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
527
548
|
],
|
|
528
549
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
529
550
|
},
|
|
530
|
-
[
|
|
551
|
+
[VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
|
|
531
552
|
id: 112,
|
|
532
|
-
code:
|
|
553
|
+
code: VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
|
|
533
554
|
title: 'Npmrc Exposed',
|
|
534
555
|
description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
535
556
|
severity: 'high',
|
|
557
|
+
levelId: 2,
|
|
536
558
|
category: 'information_disclosure',
|
|
537
559
|
scanner: 'sensitive-path-scout',
|
|
538
560
|
cvss: {
|
|
@@ -548,12 +570,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
548
570
|
],
|
|
549
571
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
550
572
|
},
|
|
551
|
-
[
|
|
573
|
+
[VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
|
|
552
574
|
id: 113,
|
|
553
|
-
code:
|
|
575
|
+
code: VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
|
|
554
576
|
title: 'TOML Project File Exposed',
|
|
555
577
|
description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
556
578
|
severity: 'low',
|
|
579
|
+
levelId: 4,
|
|
557
580
|
category: 'information_disclosure',
|
|
558
581
|
scanner: 'sensitive-path-scout',
|
|
559
582
|
cvss: {
|
|
@@ -569,12 +592,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
569
592
|
],
|
|
570
593
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
571
594
|
},
|
|
572
|
-
[
|
|
595
|
+
[VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
|
|
573
596
|
id: 114,
|
|
574
|
-
code:
|
|
597
|
+
code: VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
|
|
575
598
|
title: 'Rails Database YML Exposed',
|
|
576
599
|
description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
577
600
|
severity: 'high',
|
|
601
|
+
levelId: 2,
|
|
578
602
|
category: 'information_disclosure',
|
|
579
603
|
scanner: 'sensitive-path-scout',
|
|
580
604
|
cvss: {
|
|
@@ -590,12 +614,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
590
614
|
],
|
|
591
615
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
592
616
|
},
|
|
593
|
-
[
|
|
617
|
+
[VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
|
|
594
618
|
id: 115,
|
|
595
|
-
code:
|
|
619
|
+
code: VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
|
|
596
620
|
title: 'Drupal Settings PHP Exposed',
|
|
597
621
|
description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
598
622
|
severity: 'high',
|
|
623
|
+
levelId: 2,
|
|
599
624
|
category: 'information_disclosure',
|
|
600
625
|
scanner: 'sensitive-path-scout',
|
|
601
626
|
cvss: {
|
|
@@ -611,12 +636,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
611
636
|
],
|
|
612
637
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
613
638
|
},
|
|
614
|
-
[
|
|
639
|
+
[VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
|
|
615
640
|
id: 116,
|
|
616
|
-
code:
|
|
641
|
+
code: VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
|
|
617
642
|
title: 'Magento Env PHP Exposed',
|
|
618
643
|
description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
619
644
|
severity: 'high',
|
|
645
|
+
levelId: 2,
|
|
620
646
|
category: 'information_disclosure',
|
|
621
647
|
scanner: 'sensitive-path-scout',
|
|
622
648
|
cvss: {
|
|
@@ -632,12 +658,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
632
658
|
],
|
|
633
659
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
634
660
|
},
|
|
635
|
-
[
|
|
661
|
+
[VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
|
|
636
662
|
id: 117,
|
|
637
|
-
code:
|
|
663
|
+
code: VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
|
|
638
664
|
title: 'Jolokia Exposed',
|
|
639
665
|
description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
640
666
|
severity: 'high',
|
|
667
|
+
levelId: 2,
|
|
641
668
|
category: 'information_disclosure',
|
|
642
669
|
scanner: 'sensitive-path-scout',
|
|
643
670
|
cvss: {
|
|
@@ -653,12 +680,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
653
680
|
],
|
|
654
681
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
655
682
|
},
|
|
656
|
-
[
|
|
683
|
+
[VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
|
|
657
684
|
id: 118,
|
|
658
|
-
code:
|
|
685
|
+
code: VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
|
|
659
686
|
title: 'SVN Working Copy Database Exposed',
|
|
660
687
|
description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
661
688
|
severity: 'high',
|
|
689
|
+
levelId: 2,
|
|
662
690
|
category: 'information_disclosure',
|
|
663
691
|
scanner: 'sensitive-path-scout',
|
|
664
692
|
cvss: {
|
|
@@ -674,12 +702,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
674
702
|
],
|
|
675
703
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
676
704
|
},
|
|
677
|
-
[
|
|
705
|
+
[VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
|
|
678
706
|
id: 119,
|
|
679
|
-
code:
|
|
707
|
+
code: VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
|
|
680
708
|
title: 'Subversion Repository Detected',
|
|
681
709
|
description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
682
710
|
severity: 'high',
|
|
711
|
+
levelId: 2,
|
|
683
712
|
category: 'information_disclosure',
|
|
684
713
|
scanner: 'sensitive-path-scout',
|
|
685
714
|
cvss: {
|
|
@@ -695,12 +724,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
695
724
|
],
|
|
696
725
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
697
726
|
},
|
|
698
|
-
[
|
|
727
|
+
[VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
|
|
699
728
|
id: 120,
|
|
700
|
-
code:
|
|
729
|
+
code: VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
|
|
701
730
|
title: 'Mercurial Repository Found',
|
|
702
731
|
description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
703
732
|
severity: 'medium',
|
|
733
|
+
levelId: 3,
|
|
704
734
|
category: 'information_disclosure',
|
|
705
735
|
scanner: 'sensitive-path-scout',
|
|
706
736
|
cvss: {
|
|
@@ -716,12 +746,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
716
746
|
],
|
|
717
747
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
718
748
|
},
|
|
719
|
-
[
|
|
749
|
+
[VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
|
|
720
750
|
id: 121,
|
|
721
|
-
code:
|
|
751
|
+
code: VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
|
|
722
752
|
title: 'Mercurial Hgrc Exposed',
|
|
723
753
|
description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
724
754
|
severity: 'medium',
|
|
755
|
+
levelId: 3,
|
|
725
756
|
category: 'information_disclosure',
|
|
726
757
|
scanner: 'sensitive-path-scout',
|
|
727
758
|
cvss: {
|
|
@@ -737,12 +768,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
737
768
|
],
|
|
738
769
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
739
770
|
},
|
|
740
|
-
[
|
|
771
|
+
[VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
|
|
741
772
|
id: 122,
|
|
742
|
-
code:
|
|
773
|
+
code: VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
|
|
743
774
|
title: 'CVS Root Exposed',
|
|
744
775
|
description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
745
776
|
severity: 'medium',
|
|
777
|
+
levelId: 3,
|
|
746
778
|
category: 'information_disclosure',
|
|
747
779
|
scanner: 'sensitive-path-scout',
|
|
748
780
|
cvss: {
|
|
@@ -758,12 +790,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
758
790
|
],
|
|
759
791
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
760
792
|
},
|
|
761
|
-
[
|
|
793
|
+
[VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
|
|
762
794
|
id: 123,
|
|
763
|
-
code:
|
|
795
|
+
code: VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
|
|
764
796
|
title: 'CVS Entries Exposed',
|
|
765
797
|
description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
766
798
|
severity: 'medium',
|
|
799
|
+
levelId: 3,
|
|
767
800
|
category: 'information_disclosure',
|
|
768
801
|
scanner: 'sensitive-path-scout',
|
|
769
802
|
cvss: {
|
|
@@ -779,12 +812,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
779
812
|
],
|
|
780
813
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
781
814
|
},
|
|
782
|
-
[
|
|
815
|
+
[VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
|
|
783
816
|
id: 124,
|
|
784
|
-
code:
|
|
817
|
+
code: VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
|
|
785
818
|
title: 'Bazaar Repo Exposed',
|
|
786
819
|
description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
787
820
|
severity: 'medium',
|
|
821
|
+
levelId: 3,
|
|
788
822
|
category: 'information_disclosure',
|
|
789
823
|
scanner: 'sensitive-path-scout',
|
|
790
824
|
cvss: {
|
|
@@ -800,12 +834,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
800
834
|
],
|
|
801
835
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
802
836
|
},
|
|
803
|
-
[
|
|
837
|
+
[VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
|
|
804
838
|
id: 125,
|
|
805
|
-
code:
|
|
839
|
+
code: VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
|
|
806
840
|
title: 'Spring Boot Thread Dump Exposed',
|
|
807
841
|
description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
808
842
|
severity: 'high',
|
|
843
|
+
levelId: 2,
|
|
809
844
|
category: 'information_disclosure',
|
|
810
845
|
scanner: 'sensitive-path-scout',
|
|
811
846
|
cvss: {
|
|
@@ -821,12 +856,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
821
856
|
],
|
|
822
857
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
823
858
|
},
|
|
824
|
-
[
|
|
859
|
+
[VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
|
|
825
860
|
id: 126,
|
|
826
|
-
code:
|
|
861
|
+
code: VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
|
|
827
862
|
title: 'Redis Rdb Dump Detected',
|
|
828
863
|
description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
829
864
|
severity: 'high',
|
|
865
|
+
levelId: 2,
|
|
830
866
|
category: 'information_disclosure',
|
|
831
867
|
scanner: 'sensitive-path-scout',
|
|
832
868
|
cvss: {
|
|
@@ -842,12 +878,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
842
878
|
],
|
|
843
879
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
844
880
|
},
|
|
845
|
-
[
|
|
881
|
+
[VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
846
882
|
id: 127,
|
|
847
|
-
code:
|
|
883
|
+
code: VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
|
|
848
884
|
title: 'Atlassian Bitbucket Pipelines Configuration Detected',
|
|
849
885
|
description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
850
886
|
severity: 'low',
|
|
887
|
+
levelId: 4,
|
|
851
888
|
category: 'information_disclosure',
|
|
852
889
|
scanner: 'sensitive-path-scout',
|
|
853
890
|
cvss: {
|
|
@@ -863,12 +900,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
863
900
|
],
|
|
864
901
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
865
902
|
},
|
|
866
|
-
[
|
|
903
|
+
[VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
867
904
|
id: 128,
|
|
868
|
-
code:
|
|
905
|
+
code: VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
|
|
869
906
|
title: 'AZURE Pipelines Configuration Detected',
|
|
870
907
|
description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
871
908
|
severity: 'low',
|
|
909
|
+
levelId: 4,
|
|
872
910
|
category: 'information_disclosure',
|
|
873
911
|
scanner: 'sensitive-path-scout',
|
|
874
912
|
cvss: {
|
|
@@ -884,12 +922,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
884
922
|
],
|
|
885
923
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
886
924
|
},
|
|
887
|
-
[
|
|
925
|
+
[VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
|
|
888
926
|
id: 129,
|
|
889
|
-
code:
|
|
927
|
+
code: VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
|
|
890
928
|
title: 'AWS Code Build Buildspec Detected',
|
|
891
929
|
description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
892
930
|
severity: 'low',
|
|
931
|
+
levelId: 4,
|
|
893
932
|
category: 'information_disclosure',
|
|
894
933
|
scanner: 'sensitive-path-scout',
|
|
895
934
|
cvss: {
|
|
@@ -905,12 +944,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
905
944
|
],
|
|
906
945
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
907
946
|
},
|
|
908
|
-
[
|
|
947
|
+
[VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
|
|
909
948
|
id: 130,
|
|
910
|
-
code:
|
|
949
|
+
code: VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
|
|
911
950
|
title: 'Github Actions Workflow Detected',
|
|
912
951
|
description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
913
952
|
severity: 'low',
|
|
953
|
+
levelId: 4,
|
|
914
954
|
category: 'information_disclosure',
|
|
915
955
|
scanner: 'sensitive-path-scout',
|
|
916
956
|
cvss: {
|
|
@@ -926,12 +966,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
926
966
|
],
|
|
927
967
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
928
968
|
},
|
|
929
|
-
[
|
|
969
|
+
[VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
|
|
930
970
|
id: 131,
|
|
931
|
-
code:
|
|
971
|
+
code: VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
|
|
932
972
|
title: 'Docker Compose Configuration Detected',
|
|
933
973
|
description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
934
974
|
severity: 'medium',
|
|
975
|
+
levelId: 3,
|
|
935
976
|
category: 'information_disclosure',
|
|
936
977
|
scanner: 'sensitive-path-scout',
|
|
937
978
|
cvss: {
|
|
@@ -947,12 +988,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
947
988
|
],
|
|
948
989
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
949
990
|
},
|
|
950
|
-
[
|
|
991
|
+
[VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
|
|
951
992
|
id: 132,
|
|
952
|
-
code:
|
|
993
|
+
code: VulnerabilityCode.SENS_HIGH_TRACE_AXD,
|
|
953
994
|
title: 'Trace Axd',
|
|
954
995
|
description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
955
996
|
severity: 'high',
|
|
997
|
+
levelId: 2,
|
|
956
998
|
category: 'information_disclosure',
|
|
957
999
|
scanner: 'sensitive-path-scout',
|
|
958
1000
|
cvss: {
|
|
@@ -968,12 +1010,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
968
1010
|
],
|
|
969
1011
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
970
1012
|
},
|
|
971
|
-
[
|
|
1013
|
+
[VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
|
|
972
1014
|
id: 133,
|
|
973
|
-
code:
|
|
1015
|
+
code: VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
|
|
974
1016
|
title: 'Elmah Axd Exposed',
|
|
975
1017
|
description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
976
1018
|
severity: 'high',
|
|
1019
|
+
levelId: 2,
|
|
977
1020
|
category: 'information_disclosure',
|
|
978
1021
|
scanner: 'sensitive-path-scout',
|
|
979
1022
|
cvss: {
|
|
@@ -989,12 +1032,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
989
1032
|
],
|
|
990
1033
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
991
1034
|
},
|
|
992
|
-
[
|
|
1035
|
+
[VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
|
|
993
1036
|
id: 134,
|
|
994
|
-
code:
|
|
1037
|
+
code: VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
|
|
995
1038
|
title: 'Laravel Log Viewer Enabled',
|
|
996
1039
|
description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
997
1040
|
severity: 'medium',
|
|
1041
|
+
levelId: 3,
|
|
998
1042
|
category: 'information_disclosure',
|
|
999
1043
|
scanner: 'sensitive-path-scout',
|
|
1000
1044
|
cvss: {
|
|
@@ -1010,12 +1054,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1010
1054
|
],
|
|
1011
1055
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1012
1056
|
},
|
|
1013
|
-
[
|
|
1057
|
+
[VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
|
|
1014
1058
|
id: 135,
|
|
1015
|
-
code:
|
|
1059
|
+
code: VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
|
|
1016
1060
|
title: 'Apache Htaccess File Detected',
|
|
1017
1061
|
description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1018
1062
|
severity: 'medium',
|
|
1063
|
+
levelId: 3,
|
|
1019
1064
|
category: 'information_disclosure',
|
|
1020
1065
|
scanner: 'sensitive-path-scout',
|
|
1021
1066
|
cvss: {
|
|
@@ -1031,12 +1076,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1031
1076
|
],
|
|
1032
1077
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1033
1078
|
},
|
|
1034
|
-
[
|
|
1079
|
+
[VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
|
|
1035
1080
|
id: 136,
|
|
1036
|
-
code:
|
|
1081
|
+
code: VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
|
|
1037
1082
|
title: 'Apache Server Info Exposed',
|
|
1038
1083
|
description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1039
1084
|
severity: 'medium',
|
|
1085
|
+
levelId: 3,
|
|
1040
1086
|
category: 'information_disclosure',
|
|
1041
1087
|
scanner: 'sensitive-path-scout',
|
|
1042
1088
|
cvss: {
|
|
@@ -1052,12 +1098,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1052
1098
|
],
|
|
1053
1099
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1054
1100
|
},
|
|
1055
|
-
[
|
|
1101
|
+
[VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
|
|
1056
1102
|
id: 137,
|
|
1057
|
-
code:
|
|
1103
|
+
code: VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
|
|
1058
1104
|
title: 'Sqlite Database Detected',
|
|
1059
1105
|
description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1060
1106
|
severity: 'high',
|
|
1107
|
+
levelId: 2,
|
|
1061
1108
|
category: 'information_disclosure',
|
|
1062
1109
|
scanner: 'sensitive-path-scout',
|
|
1063
1110
|
cvss: {
|
|
@@ -1073,12 +1120,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1073
1120
|
],
|
|
1074
1121
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1075
1122
|
},
|
|
1076
|
-
[
|
|
1123
|
+
[VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
|
|
1077
1124
|
id: 138,
|
|
1078
|
-
code:
|
|
1125
|
+
code: VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
|
|
1079
1126
|
title: 'Package Dependencies Detected',
|
|
1080
1127
|
description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1081
1128
|
severity: 'medium',
|
|
1129
|
+
levelId: 3,
|
|
1082
1130
|
category: 'information_disclosure',
|
|
1083
1131
|
scanner: 'sensitive-path-scout',
|
|
1084
1132
|
cvss: {
|
|
@@ -1094,12 +1142,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1094
1142
|
],
|
|
1095
1143
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1096
1144
|
},
|
|
1097
|
-
[
|
|
1145
|
+
[VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
|
|
1098
1146
|
id: 139,
|
|
1099
|
-
code:
|
|
1147
|
+
code: VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
|
|
1100
1148
|
title: 'PHP Composer Dependencies Detected',
|
|
1101
1149
|
description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1102
1150
|
severity: 'medium',
|
|
1151
|
+
levelId: 3,
|
|
1103
1152
|
category: 'information_disclosure',
|
|
1104
1153
|
scanner: 'sensitive-path-scout',
|
|
1105
1154
|
cvss: {
|
|
@@ -1115,12 +1164,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1115
1164
|
],
|
|
1116
1165
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1117
1166
|
},
|
|
1118
|
-
[
|
|
1167
|
+
[VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
|
|
1119
1168
|
id: 140,
|
|
1120
|
-
code:
|
|
1169
|
+
code: VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
|
|
1121
1170
|
title: 'Python Requirements Detected',
|
|
1122
1171
|
description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1123
1172
|
severity: 'low',
|
|
1173
|
+
levelId: 4,
|
|
1124
1174
|
category: 'information_disclosure',
|
|
1125
1175
|
scanner: 'sensitive-path-scout',
|
|
1126
1176
|
cvss: {
|
|
@@ -1136,12 +1186,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1136
1186
|
],
|
|
1137
1187
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1138
1188
|
},
|
|
1139
|
-
[
|
|
1189
|
+
[VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
|
|
1140
1190
|
id: 141,
|
|
1141
|
-
code:
|
|
1191
|
+
code: VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
|
|
1142
1192
|
title: 'AWS Config Exposed',
|
|
1143
1193
|
description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1144
1194
|
severity: 'high',
|
|
1195
|
+
levelId: 2,
|
|
1145
1196
|
category: 'information_disclosure',
|
|
1146
1197
|
scanner: 'sensitive-path-scout',
|
|
1147
1198
|
cvss: {
|
|
@@ -1157,12 +1208,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1157
1208
|
],
|
|
1158
1209
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1159
1210
|
},
|
|
1160
|
-
[
|
|
1211
|
+
[VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
|
|
1161
1212
|
id: 142,
|
|
1162
|
-
code:
|
|
1213
|
+
code: VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
|
|
1163
1214
|
title: 'AZURE Credentials Exposed',
|
|
1164
1215
|
description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1165
1216
|
severity: 'high',
|
|
1217
|
+
levelId: 2,
|
|
1166
1218
|
category: 'information_disclosure',
|
|
1167
1219
|
scanner: 'sensitive-path-scout',
|
|
1168
1220
|
cvss: {
|
|
@@ -1178,12 +1230,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1178
1230
|
],
|
|
1179
1231
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1180
1232
|
},
|
|
1181
|
-
[
|
|
1233
|
+
[VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
|
|
1182
1234
|
id: 143,
|
|
1183
|
-
code:
|
|
1235
|
+
code: VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
|
|
1184
1236
|
title: 'Helm Values Exposed',
|
|
1185
1237
|
description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1186
1238
|
severity: 'high',
|
|
1239
|
+
levelId: 2,
|
|
1187
1240
|
category: 'information_disclosure',
|
|
1188
1241
|
scanner: 'sensitive-path-scout',
|
|
1189
1242
|
cvss: {
|
|
@@ -1199,12 +1252,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1199
1252
|
],
|
|
1200
1253
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1201
1254
|
},
|
|
1202
|
-
[
|
|
1255
|
+
[VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
|
|
1203
1256
|
id: 144,
|
|
1204
|
-
code:
|
|
1257
|
+
code: VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
|
|
1205
1258
|
title: 'SSH Public Key Exposed',
|
|
1206
1259
|
description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1207
1260
|
severity: 'medium',
|
|
1261
|
+
levelId: 3,
|
|
1208
1262
|
category: 'information_disclosure',
|
|
1209
1263
|
scanner: 'sensitive-path-scout',
|
|
1210
1264
|
cvss: {
|
|
@@ -1220,12 +1274,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1220
1274
|
],
|
|
1221
1275
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1222
1276
|
},
|
|
1223
|
-
[
|
|
1277
|
+
[VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
|
|
1224
1278
|
id: 145,
|
|
1225
|
-
code:
|
|
1279
|
+
code: VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
|
|
1226
1280
|
title: 'SSL Certificate Exposed',
|
|
1227
1281
|
description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1228
1282
|
severity: 'medium',
|
|
1283
|
+
levelId: 3,
|
|
1229
1284
|
category: 'information_disclosure',
|
|
1230
1285
|
scanner: 'sensitive-path-scout',
|
|
1231
1286
|
cvss: {
|
|
@@ -1241,12 +1296,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1241
1296
|
],
|
|
1242
1297
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1243
1298
|
},
|
|
1244
|
-
[
|
|
1299
|
+
[VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
|
|
1245
1300
|
id: 146,
|
|
1246
|
-
code:
|
|
1301
|
+
code: VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
|
|
1247
1302
|
title: 'Graph Ql Endpoint Exposed',
|
|
1248
1303
|
description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1249
1304
|
severity: 'medium',
|
|
1305
|
+
levelId: 3,
|
|
1250
1306
|
category: 'information_disclosure',
|
|
1251
1307
|
scanner: 'sensitive-path-scout',
|
|
1252
1308
|
cvss: {
|
|
@@ -1262,12 +1318,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1262
1318
|
],
|
|
1263
1319
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1264
1320
|
},
|
|
1265
|
-
[
|
|
1321
|
+
[VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
|
|
1266
1322
|
id: 147,
|
|
1267
|
-
code:
|
|
1323
|
+
code: VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
|
|
1268
1324
|
title: 'Graphi Ql Exposed',
|
|
1269
1325
|
description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1270
1326
|
severity: 'medium',
|
|
1327
|
+
levelId: 3,
|
|
1271
1328
|
category: 'information_disclosure',
|
|
1272
1329
|
scanner: 'sensitive-path-scout',
|
|
1273
1330
|
cvss: {
|
|
@@ -1283,12 +1340,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1283
1340
|
],
|
|
1284
1341
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1285
1342
|
},
|
|
1286
|
-
[
|
|
1343
|
+
[VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
|
|
1287
1344
|
id: 148,
|
|
1288
|
-
code:
|
|
1345
|
+
code: VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
|
|
1289
1346
|
title: 'Terraform Lock Exposed',
|
|
1290
1347
|
description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1291
1348
|
severity: 'medium',
|
|
1349
|
+
levelId: 3,
|
|
1292
1350
|
category: 'information_disclosure',
|
|
1293
1351
|
scanner: 'sensitive-path-scout',
|
|
1294
1352
|
cvss: {
|
|
@@ -1304,12 +1362,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1304
1362
|
],
|
|
1305
1363
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1306
1364
|
},
|
|
1307
|
-
[
|
|
1365
|
+
[VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
|
|
1308
1366
|
id: 149,
|
|
1309
|
-
code:
|
|
1367
|
+
code: VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
|
|
1310
1368
|
title: 'Terraform Vars Exposed',
|
|
1311
1369
|
description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1312
1370
|
severity: 'high',
|
|
1371
|
+
levelId: 2,
|
|
1313
1372
|
category: 'information_disclosure',
|
|
1314
1373
|
scanner: 'sensitive-path-scout',
|
|
1315
1374
|
cvss: {
|
|
@@ -1325,12 +1384,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1325
1384
|
],
|
|
1326
1385
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1327
1386
|
},
|
|
1328
|
-
[
|
|
1387
|
+
[VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
|
|
1329
1388
|
id: 150,
|
|
1330
|
-
code:
|
|
1389
|
+
code: VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
|
|
1331
1390
|
title: 'Error Log Exposed',
|
|
1332
1391
|
description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1333
1392
|
severity: 'medium',
|
|
1393
|
+
levelId: 3,
|
|
1334
1394
|
category: 'information_disclosure',
|
|
1335
1395
|
scanner: 'sensitive-path-scout',
|
|
1336
1396
|
cvss: {
|
|
@@ -1346,12 +1406,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1346
1406
|
],
|
|
1347
1407
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1348
1408
|
},
|
|
1349
|
-
[
|
|
1409
|
+
[VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
|
|
1350
1410
|
id: 151,
|
|
1351
|
-
code:
|
|
1411
|
+
code: VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
|
|
1352
1412
|
title: 'Access Log Exposed',
|
|
1353
1413
|
description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1354
1414
|
severity: 'medium',
|
|
1415
|
+
levelId: 3,
|
|
1355
1416
|
category: 'information_disclosure',
|
|
1356
1417
|
scanner: 'sensitive-path-scout',
|
|
1357
1418
|
cvss: {
|
|
@@ -1367,12 +1428,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1367
1428
|
],
|
|
1368
1429
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1369
1430
|
},
|
|
1370
|
-
[
|
|
1431
|
+
[VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
|
|
1371
1432
|
id: 152,
|
|
1372
|
-
code:
|
|
1433
|
+
code: VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
|
|
1373
1434
|
title: 'Debug Log Exposed',
|
|
1374
1435
|
description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1375
1436
|
severity: 'medium',
|
|
1437
|
+
levelId: 3,
|
|
1376
1438
|
category: 'information_disclosure',
|
|
1377
1439
|
scanner: 'sensitive-path-scout',
|
|
1378
1440
|
cvss: {
|
|
@@ -1388,12 +1450,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1388
1450
|
],
|
|
1389
1451
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1390
1452
|
},
|
|
1391
|
-
[
|
|
1453
|
+
[VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
|
|
1392
1454
|
id: 153,
|
|
1393
|
-
code:
|
|
1455
|
+
code: VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
|
|
1394
1456
|
title: 'Application Log Exposed',
|
|
1395
1457
|
description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1396
1458
|
severity: 'medium',
|
|
1459
|
+
levelId: 3,
|
|
1397
1460
|
category: 'information_disclosure',
|
|
1398
1461
|
scanner: 'sensitive-path-scout',
|
|
1399
1462
|
cvss: {
|
|
@@ -1409,12 +1472,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1409
1472
|
],
|
|
1410
1473
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1411
1474
|
},
|
|
1412
|
-
[
|
|
1475
|
+
[VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
|
|
1413
1476
|
id: 154,
|
|
1414
|
-
code:
|
|
1477
|
+
code: VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
|
|
1415
1478
|
title: 'Laravel Log Exposed',
|
|
1416
1479
|
description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1417
1480
|
severity: 'high',
|
|
1481
|
+
levelId: 2,
|
|
1418
1482
|
category: 'information_disclosure',
|
|
1419
1483
|
scanner: 'sensitive-path-scout',
|
|
1420
1484
|
cvss: {
|
|
@@ -1430,12 +1494,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1430
1494
|
],
|
|
1431
1495
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1432
1496
|
},
|
|
1433
|
-
[
|
|
1497
|
+
[VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
|
|
1434
1498
|
id: 155,
|
|
1435
|
-
code:
|
|
1499
|
+
code: VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
|
|
1436
1500
|
title: 'Word Press Debug Log Exposed',
|
|
1437
1501
|
description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1438
1502
|
severity: 'high',
|
|
1503
|
+
levelId: 2,
|
|
1439
1504
|
category: 'information_disclosure',
|
|
1440
1505
|
scanner: 'sensitive-path-scout',
|
|
1441
1506
|
cvss: {
|
|
@@ -1451,12 +1516,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1451
1516
|
],
|
|
1452
1517
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1453
1518
|
},
|
|
1454
|
-
[
|
|
1519
|
+
[VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
|
|
1455
1520
|
id: 156,
|
|
1456
|
-
code:
|
|
1521
|
+
code: VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
|
|
1457
1522
|
title: 'Adminer Exposed',
|
|
1458
1523
|
description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1459
1524
|
severity: 'high',
|
|
1525
|
+
levelId: 2,
|
|
1460
1526
|
category: 'information_disclosure',
|
|
1461
1527
|
scanner: 'sensitive-path-scout',
|
|
1462
1528
|
cvss: {
|
|
@@ -1472,12 +1538,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1472
1538
|
],
|
|
1473
1539
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1474
1540
|
},
|
|
1475
|
-
[
|
|
1541
|
+
[VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
|
|
1476
1542
|
id: 157,
|
|
1477
|
-
code:
|
|
1543
|
+
code: VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
|
|
1478
1544
|
title: 'WSDL Exposed',
|
|
1479
1545
|
description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1480
1546
|
severity: 'medium',
|
|
1547
|
+
levelId: 3,
|
|
1481
1548
|
category: 'information_disclosure',
|
|
1482
1549
|
scanner: 'sensitive-path-scout',
|
|
1483
1550
|
cvss: {
|
|
@@ -1493,12 +1560,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1493
1560
|
],
|
|
1494
1561
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1495
1562
|
},
|
|
1496
|
-
[
|
|
1563
|
+
[VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
|
|
1497
1564
|
id: 158,
|
|
1498
|
-
code:
|
|
1565
|
+
code: VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
|
|
1499
1566
|
title: 'Debug Endpoint Exposed',
|
|
1500
1567
|
description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1501
1568
|
severity: 'high',
|
|
1569
|
+
levelId: 2,
|
|
1502
1570
|
category: 'information_disclosure',
|
|
1503
1571
|
scanner: 'sensitive-path-scout',
|
|
1504
1572
|
cvss: {
|
|
@@ -1514,12 +1582,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1514
1582
|
],
|
|
1515
1583
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1516
1584
|
},
|
|
1517
|
-
[
|
|
1585
|
+
[VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
|
|
1518
1586
|
id: 159,
|
|
1519
|
-
code:
|
|
1587
|
+
code: VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
|
|
1520
1588
|
title: 'Go Debug Vars Exposed',
|
|
1521
1589
|
description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1522
1590
|
severity: 'high',
|
|
1591
|
+
levelId: 2,
|
|
1523
1592
|
category: 'information_disclosure',
|
|
1524
1593
|
scanner: 'sensitive-path-scout',
|
|
1525
1594
|
cvss: {
|
|
@@ -1535,12 +1604,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1535
1604
|
],
|
|
1536
1605
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1537
1606
|
},
|
|
1538
|
-
[
|
|
1607
|
+
[VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
|
|
1539
1608
|
id: 160,
|
|
1540
|
-
code:
|
|
1609
|
+
code: VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
|
|
1541
1610
|
title: 'Go Pprof Exposed',
|
|
1542
1611
|
description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1543
1612
|
severity: 'high',
|
|
1613
|
+
levelId: 2,
|
|
1544
1614
|
category: 'information_disclosure',
|
|
1545
1615
|
scanner: 'sensitive-path-scout',
|
|
1546
1616
|
cvss: {
|
|
@@ -1556,12 +1626,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1556
1626
|
],
|
|
1557
1627
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1558
1628
|
},
|
|
1559
|
-
[
|
|
1629
|
+
[VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
|
|
1560
1630
|
id: 161,
|
|
1561
|
-
code:
|
|
1631
|
+
code: VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
|
|
1562
1632
|
title: 'Word Press XML Rpc Exposed',
|
|
1563
1633
|
description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1564
1634
|
severity: 'medium',
|
|
1635
|
+
levelId: 3,
|
|
1565
1636
|
category: 'information_disclosure',
|
|
1566
1637
|
scanner: 'sensitive-path-scout',
|
|
1567
1638
|
cvss: {
|
|
@@ -1577,12 +1648,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1577
1648
|
],
|
|
1578
1649
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1579
1650
|
},
|
|
1580
|
-
[
|
|
1651
|
+
[VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
|
|
1581
1652
|
id: 162,
|
|
1582
|
-
code:
|
|
1653
|
+
code: VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
|
|
1583
1654
|
title: 'Test Endpoint Exposed',
|
|
1584
1655
|
description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1585
1656
|
severity: 'low',
|
|
1657
|
+
levelId: 4,
|
|
1586
1658
|
category: 'information_disclosure',
|
|
1587
1659
|
scanner: 'sensitive-path-scout',
|
|
1588
1660
|
cvss: {
|
|
@@ -1598,12 +1670,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1598
1670
|
],
|
|
1599
1671
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1600
1672
|
},
|
|
1601
|
-
[
|
|
1673
|
+
[VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
|
|
1602
1674
|
id: 163,
|
|
1603
|
-
code:
|
|
1675
|
+
code: VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
|
|
1604
1676
|
title: 'Staging Endpoint Exposed',
|
|
1605
1677
|
description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1606
1678
|
severity: 'low',
|
|
1679
|
+
levelId: 4,
|
|
1607
1680
|
category: 'information_disclosure',
|
|
1608
1681
|
scanner: 'sensitive-path-scout',
|
|
1609
1682
|
cvss: {
|
|
@@ -1619,12 +1692,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1619
1692
|
],
|
|
1620
1693
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1621
1694
|
},
|
|
1622
|
-
[
|
|
1695
|
+
[VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
|
|
1623
1696
|
id: 164,
|
|
1624
|
-
code:
|
|
1697
|
+
code: VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
|
|
1625
1698
|
title: 'Editor Backup File Detected',
|
|
1626
1699
|
description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1627
1700
|
severity: 'low',
|
|
1701
|
+
levelId: 4,
|
|
1628
1702
|
category: 'information_disclosure',
|
|
1629
1703
|
scanner: 'sensitive-path-scout',
|
|
1630
1704
|
cvss: {
|
|
@@ -1640,12 +1714,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1640
1714
|
],
|
|
1641
1715
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1642
1716
|
},
|
|
1643
|
-
[
|
|
1717
|
+
[VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
|
|
1644
1718
|
id: 165,
|
|
1645
|
-
code:
|
|
1719
|
+
code: VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
|
|
1646
1720
|
title: 'VIM Swap File Detected',
|
|
1647
1721
|
description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1648
1722
|
severity: 'low',
|
|
1723
|
+
levelId: 4,
|
|
1649
1724
|
category: 'information_disclosure',
|
|
1650
1725
|
scanner: 'sensitive-path-scout',
|
|
1651
1726
|
cvss: {
|
|
@@ -1661,12 +1736,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1661
1736
|
],
|
|
1662
1737
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1663
1738
|
},
|
|
1664
|
-
[
|
|
1739
|
+
[VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
|
|
1665
1740
|
id: 166,
|
|
1666
|
-
code:
|
|
1741
|
+
code: VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
|
|
1667
1742
|
title: 'Directory Listing Enabled',
|
|
1668
1743
|
description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1669
1744
|
severity: 'low',
|
|
1745
|
+
levelId: 4,
|
|
1670
1746
|
category: 'information_disclosure',
|
|
1671
1747
|
scanner: 'sensitive-path-scout',
|
|
1672
1748
|
cvss: {
|
|
@@ -1682,12 +1758,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1682
1758
|
],
|
|
1683
1759
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1684
1760
|
},
|
|
1685
|
-
[
|
|
1761
|
+
[VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
|
|
1686
1762
|
id: 167,
|
|
1687
|
-
code:
|
|
1763
|
+
code: VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
|
|
1688
1764
|
title: 'AZURE Storage Config Exposed',
|
|
1689
1765
|
description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1690
1766
|
severity: 'high',
|
|
1767
|
+
levelId: 2,
|
|
1691
1768
|
category: 'information_disclosure',
|
|
1692
1769
|
scanner: 'sensitive-path-scout',
|
|
1693
1770
|
cvss: {
|
|
@@ -1703,12 +1780,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1703
1780
|
],
|
|
1704
1781
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1705
1782
|
},
|
|
1706
|
-
[
|
|
1783
|
+
[VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
|
|
1707
1784
|
id: 168,
|
|
1708
|
-
code:
|
|
1785
|
+
code: VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
|
|
1709
1786
|
title: 'Mongo Rc Exposed',
|
|
1710
1787
|
description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1711
1788
|
severity: 'high',
|
|
1789
|
+
levelId: 2,
|
|
1712
1790
|
category: 'information_disclosure',
|
|
1713
1791
|
scanner: 'sensitive-path-scout',
|
|
1714
1792
|
cvss: {
|
|
@@ -1724,12 +1802,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1724
1802
|
],
|
|
1725
1803
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1726
1804
|
},
|
|
1727
|
-
[
|
|
1805
|
+
[VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
|
|
1728
1806
|
id: 169,
|
|
1729
|
-
code:
|
|
1807
|
+
code: VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
|
|
1730
1808
|
title: 'Awssam Template Exposed',
|
|
1731
1809
|
description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1732
1810
|
severity: 'low',
|
|
1811
|
+
levelId: 4,
|
|
1733
1812
|
category: 'information_disclosure',
|
|
1734
1813
|
scanner: 'sensitive-path-scout',
|
|
1735
1814
|
cvss: {
|
|
@@ -1745,12 +1824,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1745
1824
|
],
|
|
1746
1825
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1747
1826
|
},
|
|
1748
|
-
[
|
|
1827
|
+
[VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
|
|
1749
1828
|
id: 170,
|
|
1750
|
-
code:
|
|
1829
|
+
code: VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
|
|
1751
1830
|
title: 'Serverless Config Exposed',
|
|
1752
1831
|
description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1753
1832
|
severity: 'low',
|
|
1833
|
+
levelId: 4,
|
|
1754
1834
|
category: 'information_disclosure',
|
|
1755
1835
|
scanner: 'sensitive-path-scout',
|
|
1756
1836
|
cvss: {
|
|
@@ -1766,12 +1846,13 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1766
1846
|
],
|
|
1767
1847
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1768
1848
|
},
|
|
1769
|
-
[
|
|
1849
|
+
[VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
|
|
1770
1850
|
id: 171,
|
|
1771
|
-
code:
|
|
1851
|
+
code: VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
|
|
1772
1852
|
title: 'Cloud Formation Template Exposed',
|
|
1773
1853
|
description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1774
1854
|
severity: 'low',
|
|
1855
|
+
levelId: 4,
|
|
1775
1856
|
category: 'information_disclosure',
|
|
1776
1857
|
scanner: 'sensitive-path-scout',
|
|
1777
1858
|
cvss: {
|
|
@@ -1788,4 +1869,4 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1788
1869
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1789
1870
|
},
|
|
1790
1871
|
};
|
|
1791
|
-
|
|
1872
|
+
export default SENSITIVE_PATH_VULNERABILITIES;
|