SFTP/FTP Password Exposure via sftp-config.json
2023-9-21 00:24:38 Author: cxsecurity.com(查看原文) 阅读量:10 收藏

SFTP/FTP Password Exposure via sftp-config.json

2023.09.20

Risk:

Low

Local:

Yes

Remote:

Yes

CWE:

N/A

The issue was found in the sftp-config.json file. PoC : “type”: “sftp”, “host”: “SFTP HOST”, “user”: “SFTP USER”, “password”: “SFTP PASS”, “port”: “22”,

References:

https://blog.sucuri.net/2012/11/psa-sftpftp-password-exposure-via-sftp-config-json.html



Vote for this issue:

50%

50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.



(*) - required fields.  
{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2023090071
如有侵权请联系:admin#unsafe.sh