An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7ced1d8e9ced1d8e9c15160bff13570b9
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 test # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb790f673c290f673c2a3c932402d7212e0
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 prodbilling.global.internal.com # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7491b758d491b758ddea176831046b1d5
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 gateway # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7853d91ac853d91aca5437636c045592e
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 www2 # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dc2c2bfb7232d5715232d5715068fb79b3f7e242d
Found host file trough Directory traversal: 127.0.0.1 localhost 127.0.1.1 firewall # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters
A JSON configuration file has been found at config.json
.
It may contains application configuration such as credentials.
False positive might happen when hitting a JSON API endpoint.
Fingerprint: b18befd9dd653682618706c1618706c1618706c1618706c1618706c1618706c1
{"serverTime":638034867182612363}