Elasticsearch and/or Kibana is currently open without authentication.
Additionaly a ransom note has been found in the dataset which indicates it has been compromised
This results in all the database data made available publicly.
Severity: high
Fingerprint: 831cb76b8e05df4637d06541a27ad47fa27ad47fa27ad47fa27ad47fa27ad47f
Indices: 1, document count: 1, size: 4.0 kB Found index read-me with 1 documents (4.0 kB)
Severity: high
Fingerprint: 831cb76b8e05df461d0fc7054c25ee686c8b55756c8b55756c8b55756c8b5575
Indices: 2, document count: 3, size: 43.4 kB Found index read_me with 1 documents (4.5 kB) Found index service with 2 documents (38.9 kB)
Severity: high
Fingerprint: 831cb76b8e05df46872fd496e6e5d2c102524603025246030252460302524603
Indices: 2, document count: 2, size: 24.1 kB Found index read_me with 1 documents (4.5 kB) Found index service with 1 documents (19.6 kB)
Severity: high
Fingerprint: 831cb76b8e05df4640f0fac6c20d1751c20d1751c20d1751c20d1751c20d1751
Indices: 1, document count: 1, size: 4.5 kB Found index read_me with 1 documents (4.5 kB)
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e520a03d
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true ignorecase = true precomposeunicode = true [remote "origin"] url = https://gitee.com/haodong108/fireworks-2023.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35bf0bc6b0c52533d2c4e0a28af17b9e208
Found 14 files trough .DS_Store spidering: /audio /css /fonts /images /images/favicon.png /images/Image_Preview.png /images/template /images/template/1.png /images/template/2.png /images/template/3.png /index.html /js /LICENSE /README.md
Severity: low
Fingerprint: 5f32cf5d6962f09cec7f8772ec7f87727ba018ad07469175e4e2a01e98c95d47
Found 11 files trough .DS_Store spidering: /audio /css /fonts /images /images/favicon.png /images/Image_Preview.png /images/template /index.html /js /LICENSE /README.md
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e520a03d
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true ignorecase = true precomposeunicode = true [remote "origin"] url = https://gitee.com/haodong108/fireworks-2023.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35bf0bc6b0c52533d2c4e0a28af17b9e208
Found 14 files trough .DS_Store spidering: /audio /css /fonts /images /images/favicon.png /images/Image_Preview.png /images/template /images/template/1.png /images/template/2.png /images/template/3.png /index.html /js /LICENSE /README.md