A JSON configuration file has been found at config.json
.
It may contains application configuration such as credentials.
False positive might happen when hitting a JSON API endpoint.
Fingerprint: b18befd9dd65368287af649987af649987af649987af649987af649987af6499
{"serverTime":638041488255157062}
Fingerprint: b18befd9dd65368240eb019440eb019440eb019440eb019440eb019440eb0194
{"serverTime":638034224807619146}
Fingerprint: b18befd9dd6536821b6d0e081b6d0e081b6d0e081b6d0e081b6d0e081b6d0e08
{"serverTime":638021878492117748}
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7873d3885873d388536ff164be00abefd
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 web # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7389c8af2389c8af258e7de30f9a74730
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 invoiceserver.global.internal.com # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7c94ba565c94ba565c9811f2bb9c92cdd
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 ns.global.internal.com # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7c94ba565c94ba565c9811f2bb9c92cdd
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 ns.global.internal.com # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb76058a0c46058a0c49ed04f5e65278c96
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 user # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters