Files
nuclei-templates/http/misconfiguration/php-debugbar-exposure.yaml

33 lines
1.2 KiB
YAML
Raw Normal View History

2023-08-25 17:05:04 +05:30
id: php-debugbar-exposure
info:
name: Php Debug Bar - Exposure
author: ritikchaddha,pdteam,DhiyaneshDk,geeknik
2024-04-05 10:33:06 +05:30
severity: high
2023-08-25 17:05:04 +05:30
description: |
The DebugBar integrates easily into projects and can display profiling data from any part of your application.This template detects exposed PHP Debug Bars by looking for known response bodies and the `phpdebugbar-id` in headers.
2023-08-25 17:05:04 +05:30
reference:
- https://hackerone.com/reports/1883806
- http://phpdebugbar.com/
- https://github.com/maximebf/php-debugbar
metadata:
verified: true
2023-10-14 16:57:55 +05:30
max-request: 2
2023-08-25 17:05:04 +05:30
shodan-query: html:"phpdebugbar"
tags: misconfig,php,phpdebug,exposure,debug
2023-08-25 17:05:04 +05:30
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/_debugbar/open"
stop-at-first-match: true
2023-08-25 17:05:04 +05:30
matchers:
- type: dsl
dsl:
- 'contains_all(body, "phpdebugbar", "widget") && status_code == 200'
- 'contains(header, "phpdebugbar-id")'
- 'contains_all(body, "\"utime\"","\"datetime\"","{\"id") && contains(content_type, "application/json")'
2024-12-30 09:35:40 +00:00
condition: or
# digest: 4b0a00483046022100afe19a0354e51a6998d9b6479572ee8033beafb6545c6255b40aca4d88ad4b76022100f8e4f12d81bb172eb43aa7dc994a02cc43e64f28250a521dfdd0574162c539df:922c64590222798bb761d5b6d8e72950