@zerothreatai/vulnerability-registry 4.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +17 -17
- package/dist/categories/configuration.js +80 -80
- package/dist/categories/injection.js +34 -34
- package/dist/categories/sensitive-paths.js +84 -84
- package/dist/categories/ssrf.js +11 -11
- package/dist/categories/xss.js +15 -15
- package/dist-cjs/categories/authentication.js +17 -17
- package/dist-cjs/categories/configuration.js +80 -80
- package/dist-cjs/categories/injection.js +34 -34
- package/dist-cjs/categories/sensitive-paths.js +84 -84
- package/dist-cjs/categories/ssrf.js +11 -11
- package/dist-cjs/categories/xss.js +15 -15
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +17 -17
- package/src/categories/configuration.ts +80 -80
- package/src/categories/injection.ts +34 -34
- package/src/categories/sensitive-paths.ts +84 -84
- package/src/categories/ssrf.ts +11 -11
- package/src/categories/xss.ts +15 -15
- package/src/id-registry.json +1235 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -392
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -1782
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -781
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1872
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -258
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -340
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -280
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -350
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -92
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -88
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -6
- package/src/types.js.map +0 -1
|
@@ -10,7 +10,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
10
10
|
// CRITICAL - CREDENTIAL EXPOSURE
|
|
11
11
|
// ========================================
|
|
12
12
|
[VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
|
|
13
|
-
id:
|
|
13
|
+
id: 500,
|
|
14
14
|
code: VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
|
|
15
15
|
title: 'AWS Credentials Exposed',
|
|
16
16
|
description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
|
|
@@ -33,7 +33,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
33
33
|
remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
|
|
34
34
|
},
|
|
35
35
|
[VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
|
|
36
|
-
id:
|
|
36
|
+
id: 501,
|
|
37
37
|
code: VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
|
|
38
38
|
title: 'SSH Private Key Exposed',
|
|
39
39
|
description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
|
|
@@ -55,7 +55,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
55
55
|
remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
|
|
56
56
|
},
|
|
57
57
|
[VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
|
|
58
|
-
id:
|
|
58
|
+
id: 502,
|
|
59
59
|
code: VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
|
|
60
60
|
title: 'SSL/TLS Private Key Exposed',
|
|
61
61
|
description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
|
|
@@ -77,7 +77,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
77
77
|
remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
|
|
78
78
|
},
|
|
79
79
|
[VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
|
|
80
|
-
id:
|
|
80
|
+
id: 503,
|
|
81
81
|
code: VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
|
|
82
82
|
title: 'Rails Master Key Exposed',
|
|
83
83
|
description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
|
|
@@ -99,7 +99,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
99
99
|
remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
|
|
100
100
|
},
|
|
101
101
|
[VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
|
|
102
|
-
id:
|
|
102
|
+
id: 504,
|
|
103
103
|
code: VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
|
|
104
104
|
title: 'Terraform State File Exposed',
|
|
105
105
|
description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
|
|
@@ -121,7 +121,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
121
121
|
remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
|
|
122
122
|
},
|
|
123
123
|
[VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
|
|
124
|
-
id:
|
|
124
|
+
id: 505,
|
|
125
125
|
code: VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
|
|
126
126
|
title: 'Kubernetes Config Exposed',
|
|
127
127
|
description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
|
|
@@ -143,7 +143,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
143
143
|
remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
|
|
144
144
|
},
|
|
145
145
|
[VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
|
|
146
|
-
id:
|
|
146
|
+
id: 506,
|
|
147
147
|
code: VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
|
|
148
148
|
title: 'HashiCorp Vault Secret Exposed',
|
|
149
149
|
description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
|
|
@@ -168,7 +168,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
168
168
|
// HIGH - SOURCE CODE & CONFIG EXPOSURE
|
|
169
169
|
// ========================================
|
|
170
170
|
[VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
|
|
171
|
-
id:
|
|
171
|
+
id: 507,
|
|
172
172
|
code: VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
|
|
173
173
|
title: 'Git Repository Exposed',
|
|
174
174
|
description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
|
|
@@ -190,7 +190,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
190
190
|
remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
|
|
191
191
|
},
|
|
192
192
|
[VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
|
|
193
|
-
id:
|
|
193
|
+
id: 508,
|
|
194
194
|
code: VulnerabilityCode.SENS_HIGH_ENV_FILE,
|
|
195
195
|
title: 'Environment File Exposed',
|
|
196
196
|
description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
|
|
@@ -212,7 +212,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
212
212
|
remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
|
|
213
213
|
},
|
|
214
214
|
[VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
|
|
215
|
-
id:
|
|
215
|
+
id: 509,
|
|
216
216
|
code: VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
|
|
217
217
|
title: 'WordPress Configuration File Exposed',
|
|
218
218
|
description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
|
|
@@ -234,7 +234,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
234
234
|
remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
|
|
235
235
|
},
|
|
236
236
|
[VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
|
|
237
|
-
id:
|
|
237
|
+
id: 510,
|
|
238
238
|
code: VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
|
|
239
239
|
title: 'Spring Boot Actuator Endpoints Exposed',
|
|
240
240
|
description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
|
|
@@ -257,7 +257,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
257
257
|
remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
|
|
258
258
|
},
|
|
259
259
|
[VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
|
|
260
|
-
id:
|
|
260
|
+
id: 511,
|
|
261
261
|
code: VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
|
|
262
262
|
title: 'Spring Boot Heapdump Exposed',
|
|
263
263
|
description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
|
|
@@ -279,7 +279,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
279
279
|
remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
|
|
280
280
|
},
|
|
281
281
|
[VulnerabilityCode.SENS_HIGH_PHPINFO]: {
|
|
282
|
-
id:
|
|
282
|
+
id: 512,
|
|
283
283
|
code: VulnerabilityCode.SENS_HIGH_PHPINFO,
|
|
284
284
|
title: 'PHP Info Page Exposed',
|
|
285
285
|
description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
|
|
@@ -301,7 +301,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
301
301
|
remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
|
|
302
302
|
},
|
|
303
303
|
[VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
|
|
304
|
-
id:
|
|
304
|
+
id: 513,
|
|
305
305
|
code: VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
|
|
306
306
|
title: 'Laravel Debug Mode Enabled',
|
|
307
307
|
description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
|
|
@@ -323,7 +323,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
323
323
|
remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
|
|
324
324
|
},
|
|
325
325
|
[VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
|
|
326
|
-
id:
|
|
326
|
+
id: 514,
|
|
327
327
|
code: VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
|
|
328
328
|
title: 'GraphQL Introspection Enabled',
|
|
329
329
|
description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
|
|
@@ -345,7 +345,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
345
345
|
remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
|
|
346
346
|
},
|
|
347
347
|
[VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
|
|
348
|
-
id:
|
|
348
|
+
id: 515,
|
|
349
349
|
code: VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
|
|
350
350
|
title: 'Database Backup File Exposed',
|
|
351
351
|
description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
|
|
@@ -370,7 +370,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
370
370
|
// MEDIUM - API & SERVICE EXPOSURE
|
|
371
371
|
// ========================================
|
|
372
372
|
[VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
|
|
373
|
-
id:
|
|
373
|
+
id: 516,
|
|
374
374
|
code: VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
|
|
375
375
|
title: 'Swagger/OpenAPI Documentation Exposed',
|
|
376
376
|
description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
|
|
@@ -392,7 +392,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
392
392
|
remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
|
|
393
393
|
},
|
|
394
394
|
[VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
|
|
395
|
-
id:
|
|
395
|
+
id: 517,
|
|
396
396
|
code: VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
|
|
397
397
|
title: 'Prometheus Metrics Endpoint Exposed',
|
|
398
398
|
description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
|
|
@@ -414,7 +414,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
414
414
|
remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
|
|
415
415
|
},
|
|
416
416
|
[VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
|
|
417
|
-
id:
|
|
417
|
+
id: 518,
|
|
418
418
|
code: VulnerabilityCode.SENS_MED_ADMIN_PANEL,
|
|
419
419
|
title: 'Admin Panel Publicly Accessible',
|
|
420
420
|
description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
|
|
@@ -436,7 +436,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
436
436
|
remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
|
|
437
437
|
},
|
|
438
438
|
[VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
|
|
439
|
-
id:
|
|
439
|
+
id: 519,
|
|
440
440
|
code: VulnerabilityCode.SENS_MED_SOURCE_MAP,
|
|
441
441
|
title: 'JavaScript Source Maps Exposed',
|
|
442
442
|
description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
|
|
@@ -461,7 +461,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
461
461
|
// EXTENDED SENSITIVE PATH EXPOSURES
|
|
462
462
|
// ========================================
|
|
463
463
|
[VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
|
|
464
|
-
id:
|
|
464
|
+
id: 520,
|
|
465
465
|
code: VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
|
|
466
466
|
title: 'Un Protected Config JSON',
|
|
467
467
|
description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -483,7 +483,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
483
483
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
484
484
|
},
|
|
485
485
|
[VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
|
|
486
|
-
id:
|
|
486
|
+
id: 521,
|
|
487
487
|
code: VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
|
|
488
488
|
title: 'Web Server Configuration File Detected',
|
|
489
489
|
description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -505,7 +505,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
505
505
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
506
506
|
},
|
|
507
507
|
[VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
|
|
508
|
-
id:
|
|
508
|
+
id: 522,
|
|
509
509
|
code: VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
|
|
510
510
|
title: 'Appsettings JSON Exposed',
|
|
511
511
|
description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -527,7 +527,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
527
527
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
528
528
|
},
|
|
529
529
|
[VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
|
|
530
|
-
id:
|
|
530
|
+
id: 523,
|
|
531
531
|
code: VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
|
|
532
532
|
title: 'Spring Config Exposed',
|
|
533
533
|
description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -549,7 +549,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
549
549
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
550
550
|
},
|
|
551
551
|
[VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
|
|
552
|
-
id:
|
|
552
|
+
id: 524,
|
|
553
553
|
code: VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
|
|
554
554
|
title: 'Npmrc Exposed',
|
|
555
555
|
description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -571,7 +571,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
571
571
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
572
572
|
},
|
|
573
573
|
[VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
|
|
574
|
-
id:
|
|
574
|
+
id: 525,
|
|
575
575
|
code: VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
|
|
576
576
|
title: 'TOML Project File Exposed',
|
|
577
577
|
description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -593,7 +593,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
593
593
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
594
594
|
},
|
|
595
595
|
[VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
|
|
596
|
-
id:
|
|
596
|
+
id: 526,
|
|
597
597
|
code: VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
|
|
598
598
|
title: 'Rails Database YML Exposed',
|
|
599
599
|
description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -615,7 +615,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
615
615
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
616
616
|
},
|
|
617
617
|
[VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
|
|
618
|
-
id:
|
|
618
|
+
id: 527,
|
|
619
619
|
code: VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
|
|
620
620
|
title: 'Drupal Settings PHP Exposed',
|
|
621
621
|
description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -637,7 +637,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
637
637
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
638
638
|
},
|
|
639
639
|
[VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
|
|
640
|
-
id:
|
|
640
|
+
id: 528,
|
|
641
641
|
code: VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
|
|
642
642
|
title: 'Magento Env PHP Exposed',
|
|
643
643
|
description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -659,7 +659,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
659
659
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
660
660
|
},
|
|
661
661
|
[VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
|
|
662
|
-
id:
|
|
662
|
+
id: 529,
|
|
663
663
|
code: VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
|
|
664
664
|
title: 'Jolokia Exposed',
|
|
665
665
|
description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -681,7 +681,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
681
681
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
682
682
|
},
|
|
683
683
|
[VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
|
|
684
|
-
id:
|
|
684
|
+
id: 530,
|
|
685
685
|
code: VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
|
|
686
686
|
title: 'SVN Working Copy Database Exposed',
|
|
687
687
|
description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -703,7 +703,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
703
703
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
704
704
|
},
|
|
705
705
|
[VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
|
|
706
|
-
id:
|
|
706
|
+
id: 531,
|
|
707
707
|
code: VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
|
|
708
708
|
title: 'Subversion Repository Detected',
|
|
709
709
|
description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -725,7 +725,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
725
725
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
726
726
|
},
|
|
727
727
|
[VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
|
|
728
|
-
id:
|
|
728
|
+
id: 532,
|
|
729
729
|
code: VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
|
|
730
730
|
title: 'Mercurial Repository Found',
|
|
731
731
|
description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -747,7 +747,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
747
747
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
748
748
|
},
|
|
749
749
|
[VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
|
|
750
|
-
id:
|
|
750
|
+
id: 533,
|
|
751
751
|
code: VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
|
|
752
752
|
title: 'Mercurial Hgrc Exposed',
|
|
753
753
|
description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -769,7 +769,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
769
769
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
770
770
|
},
|
|
771
771
|
[VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
|
|
772
|
-
id:
|
|
772
|
+
id: 534,
|
|
773
773
|
code: VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
|
|
774
774
|
title: 'CVS Root Exposed',
|
|
775
775
|
description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -791,7 +791,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
791
791
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
792
792
|
},
|
|
793
793
|
[VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
|
|
794
|
-
id:
|
|
794
|
+
id: 535,
|
|
795
795
|
code: VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
|
|
796
796
|
title: 'CVS Entries Exposed',
|
|
797
797
|
description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -813,7 +813,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
813
813
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
814
814
|
},
|
|
815
815
|
[VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
|
|
816
|
-
id:
|
|
816
|
+
id: 536,
|
|
817
817
|
code: VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
|
|
818
818
|
title: 'Bazaar Repo Exposed',
|
|
819
819
|
description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -835,7 +835,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
835
835
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
836
836
|
},
|
|
837
837
|
[VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
|
|
838
|
-
id:
|
|
838
|
+
id: 537,
|
|
839
839
|
code: VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
|
|
840
840
|
title: 'Spring Boot Thread Dump Exposed',
|
|
841
841
|
description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -857,7 +857,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
857
857
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
858
858
|
},
|
|
859
859
|
[VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
|
|
860
|
-
id:
|
|
860
|
+
id: 538,
|
|
861
861
|
code: VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
|
|
862
862
|
title: 'Redis Rdb Dump Detected',
|
|
863
863
|
description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -879,7 +879,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
879
879
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
880
880
|
},
|
|
881
881
|
[VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
882
|
-
id:
|
|
882
|
+
id: 539,
|
|
883
883
|
code: VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
|
|
884
884
|
title: 'Atlassian Bitbucket Pipelines Configuration Detected',
|
|
885
885
|
description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -901,7 +901,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
901
901
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
902
902
|
},
|
|
903
903
|
[VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
904
|
-
id:
|
|
904
|
+
id: 540,
|
|
905
905
|
code: VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
|
|
906
906
|
title: 'AZURE Pipelines Configuration Detected',
|
|
907
907
|
description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -923,7 +923,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
923
923
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
924
924
|
},
|
|
925
925
|
[VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
|
|
926
|
-
id:
|
|
926
|
+
id: 541,
|
|
927
927
|
code: VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
|
|
928
928
|
title: 'AWS Code Build Buildspec Detected',
|
|
929
929
|
description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -945,7 +945,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
945
945
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
946
946
|
},
|
|
947
947
|
[VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
|
|
948
|
-
id:
|
|
948
|
+
id: 542,
|
|
949
949
|
code: VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
|
|
950
950
|
title: 'Github Actions Workflow Detected',
|
|
951
951
|
description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -967,7 +967,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
967
967
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
968
968
|
},
|
|
969
969
|
[VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
|
|
970
|
-
id:
|
|
970
|
+
id: 543,
|
|
971
971
|
code: VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
|
|
972
972
|
title: 'Docker Compose Configuration Detected',
|
|
973
973
|
description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -989,7 +989,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
989
989
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
990
990
|
},
|
|
991
991
|
[VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
|
|
992
|
-
id:
|
|
992
|
+
id: 544,
|
|
993
993
|
code: VulnerabilityCode.SENS_HIGH_TRACE_AXD,
|
|
994
994
|
title: 'Trace Axd',
|
|
995
995
|
description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1011,7 +1011,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1011
1011
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1012
1012
|
},
|
|
1013
1013
|
[VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
|
|
1014
|
-
id:
|
|
1014
|
+
id: 545,
|
|
1015
1015
|
code: VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
|
|
1016
1016
|
title: 'Elmah Axd Exposed',
|
|
1017
1017
|
description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1033,7 +1033,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1033
1033
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1034
1034
|
},
|
|
1035
1035
|
[VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
|
|
1036
|
-
id:
|
|
1036
|
+
id: 546,
|
|
1037
1037
|
code: VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
|
|
1038
1038
|
title: 'Laravel Log Viewer Enabled',
|
|
1039
1039
|
description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1055,7 +1055,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1055
1055
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1056
1056
|
},
|
|
1057
1057
|
[VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
|
|
1058
|
-
id:
|
|
1058
|
+
id: 547,
|
|
1059
1059
|
code: VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
|
|
1060
1060
|
title: 'Apache Htaccess File Detected',
|
|
1061
1061
|
description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1077,7 +1077,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1077
1077
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1078
1078
|
},
|
|
1079
1079
|
[VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
|
|
1080
|
-
id:
|
|
1080
|
+
id: 548,
|
|
1081
1081
|
code: VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
|
|
1082
1082
|
title: 'Apache Server Info Exposed',
|
|
1083
1083
|
description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1099,7 +1099,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1099
1099
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1100
1100
|
},
|
|
1101
1101
|
[VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
|
|
1102
|
-
id:
|
|
1102
|
+
id: 549,
|
|
1103
1103
|
code: VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
|
|
1104
1104
|
title: 'Sqlite Database Detected',
|
|
1105
1105
|
description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1121,7 +1121,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1121
1121
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1122
1122
|
},
|
|
1123
1123
|
[VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
|
|
1124
|
-
id:
|
|
1124
|
+
id: 550,
|
|
1125
1125
|
code: VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
|
|
1126
1126
|
title: 'Package Dependencies Detected',
|
|
1127
1127
|
description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1143,7 +1143,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1143
1143
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1144
1144
|
},
|
|
1145
1145
|
[VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
|
|
1146
|
-
id:
|
|
1146
|
+
id: 551,
|
|
1147
1147
|
code: VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
|
|
1148
1148
|
title: 'PHP Composer Dependencies Detected',
|
|
1149
1149
|
description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1165,7 +1165,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1165
1165
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1166
1166
|
},
|
|
1167
1167
|
[VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
|
|
1168
|
-
id:
|
|
1168
|
+
id: 552,
|
|
1169
1169
|
code: VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
|
|
1170
1170
|
title: 'Python Requirements Detected',
|
|
1171
1171
|
description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1187,7 +1187,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1187
1187
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1188
1188
|
},
|
|
1189
1189
|
[VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
|
|
1190
|
-
id:
|
|
1190
|
+
id: 553,
|
|
1191
1191
|
code: VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
|
|
1192
1192
|
title: 'AWS Config Exposed',
|
|
1193
1193
|
description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1209,7 +1209,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1209
1209
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1210
1210
|
},
|
|
1211
1211
|
[VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
|
|
1212
|
-
id:
|
|
1212
|
+
id: 554,
|
|
1213
1213
|
code: VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
|
|
1214
1214
|
title: 'AZURE Credentials Exposed',
|
|
1215
1215
|
description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1231,7 +1231,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1231
1231
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1232
1232
|
},
|
|
1233
1233
|
[VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
|
|
1234
|
-
id:
|
|
1234
|
+
id: 555,
|
|
1235
1235
|
code: VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
|
|
1236
1236
|
title: 'Helm Values Exposed',
|
|
1237
1237
|
description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1253,7 +1253,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1253
1253
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1254
1254
|
},
|
|
1255
1255
|
[VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
|
|
1256
|
-
id:
|
|
1256
|
+
id: 556,
|
|
1257
1257
|
code: VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
|
|
1258
1258
|
title: 'SSH Public Key Exposed',
|
|
1259
1259
|
description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1275,7 +1275,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1275
1275
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1276
1276
|
},
|
|
1277
1277
|
[VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
|
|
1278
|
-
id:
|
|
1278
|
+
id: 557,
|
|
1279
1279
|
code: VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
|
|
1280
1280
|
title: 'SSL Certificate Exposed',
|
|
1281
1281
|
description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1297,7 +1297,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1297
1297
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1298
1298
|
},
|
|
1299
1299
|
[VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
|
|
1300
|
-
id:
|
|
1300
|
+
id: 558,
|
|
1301
1301
|
code: VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
|
|
1302
1302
|
title: 'Graph Ql Endpoint Exposed',
|
|
1303
1303
|
description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1319,7 +1319,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1319
1319
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1320
1320
|
},
|
|
1321
1321
|
[VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
|
|
1322
|
-
id:
|
|
1322
|
+
id: 559,
|
|
1323
1323
|
code: VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
|
|
1324
1324
|
title: 'Graphi Ql Exposed',
|
|
1325
1325
|
description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1341,7 +1341,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1341
1341
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1342
1342
|
},
|
|
1343
1343
|
[VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
|
|
1344
|
-
id:
|
|
1344
|
+
id: 560,
|
|
1345
1345
|
code: VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
|
|
1346
1346
|
title: 'Terraform Lock Exposed',
|
|
1347
1347
|
description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1363,7 +1363,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1363
1363
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1364
1364
|
},
|
|
1365
1365
|
[VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
|
|
1366
|
-
id:
|
|
1366
|
+
id: 561,
|
|
1367
1367
|
code: VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
|
|
1368
1368
|
title: 'Terraform Vars Exposed',
|
|
1369
1369
|
description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1385,7 +1385,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1385
1385
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1386
1386
|
},
|
|
1387
1387
|
[VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
|
|
1388
|
-
id:
|
|
1388
|
+
id: 562,
|
|
1389
1389
|
code: VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
|
|
1390
1390
|
title: 'Error Log Exposed',
|
|
1391
1391
|
description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1407,7 +1407,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1407
1407
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1408
1408
|
},
|
|
1409
1409
|
[VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
|
|
1410
|
-
id:
|
|
1410
|
+
id: 563,
|
|
1411
1411
|
code: VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
|
|
1412
1412
|
title: 'Access Log Exposed',
|
|
1413
1413
|
description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1429,7 +1429,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1429
1429
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1430
1430
|
},
|
|
1431
1431
|
[VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
|
|
1432
|
-
id:
|
|
1432
|
+
id: 564,
|
|
1433
1433
|
code: VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
|
|
1434
1434
|
title: 'Debug Log Exposed',
|
|
1435
1435
|
description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1451,7 +1451,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1451
1451
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1452
1452
|
},
|
|
1453
1453
|
[VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
|
|
1454
|
-
id:
|
|
1454
|
+
id: 565,
|
|
1455
1455
|
code: VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
|
|
1456
1456
|
title: 'Application Log Exposed',
|
|
1457
1457
|
description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1473,7 +1473,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1473
1473
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1474
1474
|
},
|
|
1475
1475
|
[VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
|
|
1476
|
-
id:
|
|
1476
|
+
id: 566,
|
|
1477
1477
|
code: VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
|
|
1478
1478
|
title: 'Laravel Log Exposed',
|
|
1479
1479
|
description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1495,7 +1495,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1495
1495
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1496
1496
|
},
|
|
1497
1497
|
[VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
|
|
1498
|
-
id:
|
|
1498
|
+
id: 567,
|
|
1499
1499
|
code: VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
|
|
1500
1500
|
title: 'Word Press Debug Log Exposed',
|
|
1501
1501
|
description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1517,7 +1517,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1517
1517
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1518
1518
|
},
|
|
1519
1519
|
[VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
|
|
1520
|
-
id:
|
|
1520
|
+
id: 568,
|
|
1521
1521
|
code: VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
|
|
1522
1522
|
title: 'Adminer Exposed',
|
|
1523
1523
|
description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1539,7 +1539,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1539
1539
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1540
1540
|
},
|
|
1541
1541
|
[VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
|
|
1542
|
-
id:
|
|
1542
|
+
id: 569,
|
|
1543
1543
|
code: VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
|
|
1544
1544
|
title: 'WSDL Exposed',
|
|
1545
1545
|
description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1561,7 +1561,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1561
1561
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1562
1562
|
},
|
|
1563
1563
|
[VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
|
|
1564
|
-
id:
|
|
1564
|
+
id: 570,
|
|
1565
1565
|
code: VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
|
|
1566
1566
|
title: 'Debug Endpoint Exposed',
|
|
1567
1567
|
description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1583,7 +1583,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1583
1583
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1584
1584
|
},
|
|
1585
1585
|
[VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
|
|
1586
|
-
id:
|
|
1586
|
+
id: 571,
|
|
1587
1587
|
code: VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
|
|
1588
1588
|
title: 'Go Debug Vars Exposed',
|
|
1589
1589
|
description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1605,7 +1605,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1605
1605
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1606
1606
|
},
|
|
1607
1607
|
[VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
|
|
1608
|
-
id:
|
|
1608
|
+
id: 572,
|
|
1609
1609
|
code: VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
|
|
1610
1610
|
title: 'Go Pprof Exposed',
|
|
1611
1611
|
description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1627,7 +1627,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1627
1627
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1628
1628
|
},
|
|
1629
1629
|
[VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
|
|
1630
|
-
id:
|
|
1630
|
+
id: 573,
|
|
1631
1631
|
code: VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
|
|
1632
1632
|
title: 'Word Press XML Rpc Exposed',
|
|
1633
1633
|
description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1649,7 +1649,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1649
1649
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1650
1650
|
},
|
|
1651
1651
|
[VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
|
|
1652
|
-
id:
|
|
1652
|
+
id: 574,
|
|
1653
1653
|
code: VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
|
|
1654
1654
|
title: 'Test Endpoint Exposed',
|
|
1655
1655
|
description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1671,7 +1671,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1671
1671
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1672
1672
|
},
|
|
1673
1673
|
[VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
|
|
1674
|
-
id:
|
|
1674
|
+
id: 575,
|
|
1675
1675
|
code: VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
|
|
1676
1676
|
title: 'Staging Endpoint Exposed',
|
|
1677
1677
|
description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1693,7 +1693,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1693
1693
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1694
1694
|
},
|
|
1695
1695
|
[VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
|
|
1696
|
-
id:
|
|
1696
|
+
id: 576,
|
|
1697
1697
|
code: VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
|
|
1698
1698
|
title: 'Editor Backup File Detected',
|
|
1699
1699
|
description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1715,7 +1715,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1715
1715
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1716
1716
|
},
|
|
1717
1717
|
[VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
|
|
1718
|
-
id:
|
|
1718
|
+
id: 577,
|
|
1719
1719
|
code: VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
|
|
1720
1720
|
title: 'VIM Swap File Detected',
|
|
1721
1721
|
description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1737,7 +1737,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1737
1737
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1738
1738
|
},
|
|
1739
1739
|
[VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
|
|
1740
|
-
id:
|
|
1740
|
+
id: 578,
|
|
1741
1741
|
code: VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
|
|
1742
1742
|
title: 'Directory Listing Enabled',
|
|
1743
1743
|
description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1759,7 +1759,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1759
1759
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1760
1760
|
},
|
|
1761
1761
|
[VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
|
|
1762
|
-
id:
|
|
1762
|
+
id: 579,
|
|
1763
1763
|
code: VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
|
|
1764
1764
|
title: 'AZURE Storage Config Exposed',
|
|
1765
1765
|
description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1781,7 +1781,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1781
1781
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1782
1782
|
},
|
|
1783
1783
|
[VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
|
|
1784
|
-
id:
|
|
1784
|
+
id: 580,
|
|
1785
1785
|
code: VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
|
|
1786
1786
|
title: 'Mongo Rc Exposed',
|
|
1787
1787
|
description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1803,7 +1803,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1803
1803
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1804
1804
|
},
|
|
1805
1805
|
[VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
|
|
1806
|
-
id:
|
|
1806
|
+
id: 581,
|
|
1807
1807
|
code: VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
|
|
1808
1808
|
title: 'Awssam Template Exposed',
|
|
1809
1809
|
description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1825,7 +1825,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1825
1825
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1826
1826
|
},
|
|
1827
1827
|
[VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
|
|
1828
|
-
id:
|
|
1828
|
+
id: 582,
|
|
1829
1829
|
code: VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
|
|
1830
1830
|
title: 'Serverless Config Exposed',
|
|
1831
1831
|
description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
@@ -1847,7 +1847,7 @@ export const SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1847
1847
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1848
1848
|
},
|
|
1849
1849
|
[VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
|
|
1850
|
-
id:
|
|
1850
|
+
id: 583,
|
|
1851
1851
|
code: VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
|
|
1852
1852
|
title: 'Cloud Formation Template Exposed',
|
|
1853
1853
|
description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|