Information disclosure
itβs a vulnerability that happen when website leak important data and hacker find a lot of thing :
Data about other users, such as usernames or financial information
Sensitive commercial or business data
Technical details about the website and its infrastructure
occurs when an application fails to properly protect sensitive information, giving users access to information they shouldnβt have available
π‘ Examples of information disclosure
get hidden directories, their structure, and their contents via a
robots.txt
filesource code
β ( .git - .backup - .old ,,,,,)backup files
β ( zip - tar - RAR ,,, )Hidden Files:
β files that start with.
like.hidden.php
get it withls -lah
Github search
β found files likessh keys
orapi
ortoken
internal IP addresses
website mentioning database table or column names in error messages
show sensitive information, such as credit card details
π‘ How can it happen ?
developer doesnβt remove internal content from public content.
Insecure configuration of the website and related technologies
by displaying verbose information from error messages about website
Flawed design and behavior of the application :
For example, if a website returns responses with different error ,, it happen when we make brute force login page with usernames
π‘ impact of information disclosure vulnerabilities ?
have a high impact on the users like : online shop leaking its customers' credit card details
leaking technical information : directory structure - frameworks are being used
leak source code or get to internal structure like found ssh key to internal server<aside>
π‘ How to test for information disclosure vulnerabilities :
identify interesting parameters automate this process ( Burp Intruder )
Add payload positions to parameters and use pre-built wordlists of fuzz
identify differences in responses by comparing HTTP status codes, response times, lengths
you can schedule automated scans to crawl and audit the target site
Burp Scanner will alert you if it finds sensitive information such as private keys, email addresses, and credit card and backup files, directory listings in a response
Search :
use this tool to look for any expression within the selected item.
find results using various advanced search options, such as regex search or negative search.
Find comments
use this tool to quickly extract any developer comments found in the selected item.
It also provides tabs to instantly access the HTTP request/response cycle in which each comment was found
Discover content :
this tool to identify additional content and functionality that is not linked from the website's visible content.
finding additional directories and files that won't necessarily appear in the site map automatically.
error messages can sometimes disclose interesting information while you test
we take the second step depend on the error message
Methods for test :
web crawlers :
many website provide
**/robots.txt**
and**/sitemap.xml**
to help crawlers navigate their site. they may contain sensitive information.some times burp donβt get in site map then we can **** access manually
Directory listing
Web servers can be configured to automatically list the contents of directories that do not have an index page present
after identify the resources at a given path , attacker directly to analyzing and attacking those resources
Important note : Directory listings themselves are not necessarily a security vulnerability. but , if the website also fails to implement proper access control, it lead to leaking sensitive resources in this way is clearly an issue.
Developer comments :
sometimes developer forget comments or leave it deliberately
developer must delete this comment before changing in production environment. because it might lead to hidden directories
we can easily be accessed using Burp , or page source
Error messages :
error messages can return information about what input or data type is expected from a given parameter
This can help you to narrow down your attack by identifying exploitable parameters.
Information can be : name a template engine, database type, or server that the website is using and version number
you can easily search for any documented exploits that may exist for this version
check whether there are any common configuration errors or dangerous default settings
if website is using some kind of open-source framework ? . you can study the publicly available source code
Debugging data :
many websites generate custom error messages and logs that contain large amounts of information about the application's behavior.
it is also extremely useful to an attacker if it is leaked in the production environment it can contain information like
Values for key session variables that can be manipulated via user input
Hostnames and credentials for back-end components
File and directory names on the server
secret Keys used to encrypt data transmitted via the client
6- Source code disclosure via backup files :
make it easier for an attacker to understand the application's behavior and construct high-severity attacks
Sensitive data is sometimes even hard-coded within the source code. like : API keys and credentials for accessing back-end components.
When mapping out a website, you
might find some source code files
such as.php
Last updated