S4E

N8n Scanner

This scanner detects the use of N8n Exposure in digital assets.

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

18 days 13 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

N8n is an automation tool that allows users to connect various APIs and services for workflow automation. It is widely used by entrepreneurs, developers, and businesses seeking efficient and automated data handling. The platform is open source, enabling seamless integrations and custom modifications. Its RESTful API structure allows it to cater to diverse automation needs across different sectors. N8n's interface and community support make it a popular choice for developing complex automation processes. Organizations use N8n to automate repetitive tasks, improve productivity, and manage APIs effectively.

The vulnerability detected involves the exposure of the `/rest/settings` endpoint. When this endpoint is publicly accessible, it may reveal sensitive configuration details. This could include internal settings, application secrets, and other critical information. Exposure of such details can lead to unauthorized access and exploitation. The vulnerability primarily affects the security posture of applications using N8n. Ensuring endpoint security is crucial to prevent unauthorized information disclosure.

The vulnerable endpoint is `/rest/settings`, which could be exposed due to improper security configuration. This endpoint, when accessible, returns information like `isDocker`, `databaseType`, `nodeJsVersion`, `versionCli`, and `instanceId`. The HTTP request to this endpoint involves a GET method that, upon being exposed, responds with a 200 status and provides JSON content. Properly securing this endpoint is essential to mitigate potential data leaks. Application administrators should ensure that server configurations do not publicly expose sensitive endpoints.

Exploiting this vulnerability could allow attackers to retrieve internal configurations and application secrets. This information can enable further attacks, such as database tampering or unauthorized system changes. Attackers may exploit configuration exposures to penetrate deeper into the network, leading to potentially significant breaches. Ensuring tight configuration security can prevent these exposures and maintain system integrity. This vulnerability highlights the importance of regular security audits to detect and address configuration issues.

REFERENCES

Get started to protecting your digital assets