PHP File Disclosure Scanner
This scanner detects the use of PHP File Disclosure in digital assets.
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
24 days 13 hours
Scan only one
URL
Toolbox
PHP is a widely-used open-source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. It is used by developers to create dynamic content that interacts with databases, forming the backbone of various web applications. Often employed by small to large businesses for website backend development, PHP's flexibility and wide range of functionalities make it a popular choice in website building. PHP is also used in content management systems like WordPress, Joomla, and Drupal, making it essential for millions of websites worldwide. However, due to its widespread usage, PHP applications can be prone to vulnerabilities if not carefully managed and secured. This scanner focuses on identifying any PHP file disclosure vulnerabilities in your web infrastructure.
The PHP File Disclosure vulnerability arises when backup files of PHP scripts are unintentionally exposed online. These backup files, if accessed, can reveal sensitive information such as database credentials, configuration settings, and much more. Attackers exploit this vulnerability by scanning and accessing these backup files through common naming conventions. The detection of such vulnerabilities can help mitigate the risk of unauthorized access to sensitive information. This scanner helps identify such exposed backup files within the digital assets, ensuring greater security for the applications. Early detection of file disclosure vulnerabilities can allow administrators to take corrective action in securing sensitive data.
The scanner operates by attempting to access various common backup file extensions and naming conventions associated with PHP scripts. It performs HTTP GET requests to endpoints that are likely to contain backup files, such as settings.php.bak' and config.php.old'. A successful match is determined by the presence of PHP code signatures or specific keywords typical in configuration files like 'DB_NAME'. A status code of 200 is checked to confirm access to these files, indicating that the files are publicly accessible. By automating the search for these files, the scanner assists in uncovering security oversights. Such automated scans can greatly enhance the ability to keep the server configurations secure.
If exploited, a PHP File Disclosure vulnerability can result in severe security breaches, including unauthorized database access, retrieval of sensitive data, and potential site-wide autorization compromises. It could enable attackers to gain critical insights into the server structure, allowing for further targeted attacks. Confidential information, once accessed, can be used for malicious purposes such as data theft or service disruption. Additionally, exposed configuration data can be leveraged to create exploits that may cause long-term damage to brand reliability and customer trust. Mitigating such risks involves regular screening and ensuring that backup files are not publicly accessible.
REFERENCES
- https://owasp.org/www-community/vulnerabilities/Information_Exposure_Through_Executable_Code_Snippets
- https://www.cvedetails.com/vulnerability-list/cweid-200/vulnerabilities.html