NShiftKey-Rule-Guide logo NShiftKey-Rule-Guide

1. Vulnerability Description

image2018-7-4 11_7_57

[ picture 1. Example of Unnecessary Pages]

2. How to check vulnerability

2.1 Verify that unnecessary files exist on the web directory being serviced through the Explorer(Windows) or via command(Unix).

File Content
Web src file Server Side Script files, such as *.asp~, *.inc, *.phps and etc. That is fatal if DB Connection information is included.
Back file Expose the entire source code of the web server, including *.bak, *.zip, *.tar, *.tar.gz, *.tgz and etc.
Log file Account/Time/Access information such as *.log, *.log and etc, may be exposed.
Test file Server Side Script files, such as test.asp, test.jsp, 1.php and etc. That is created by a web programmer or administrator to check whether the web server is working properly, parsing well, and database connection is good.

2.2 After setting up the Web server, verify that the default directory or default page exists.

Web Server Content
apache Check whether cgi-bin, manual, and usage directory exists.
iis Check whether iissamples, scripts, iisHelp, IISAdmin, _vit_bin, Printers exist.

2.3. Check whether the web application configuration information and the Java class files are accessible within the WEB-INF directory.

File Content
Files in WEB-INF Verify that you have access into WEB-INF/ files, such as WEB-INF/web.xml files.

image2018-7-4 11_8_43

[ picture 2. Example of WEB-INF Information Disclosure Vulnerability ]

3. Vulnerability Countermeasure

<Location /WEB-INF>SetHandler WEB-INFOrder deny,allowDeny from all</Location>