Dockerrun AWS Configuration Exposure
Attackers can get access to sensitive AWS Dockerrun configuration files.
Security Misconfiguration (SM)
How this template works
The API selection filters in this template specify the criteria for selecting the API requests to be executed. In this case, the filters include the response code range (between 200 and 300) and the extraction of the URL into a variable called "urlVar".
The execute section defines the type of request to be executed, which is a single request in this case. It also specifies the request to be made, which includes modifying the URL by appending "/Dockerrun.aws.json" to the value of the "urlVar" variable.
The validation section defines the criteria for validating the response of the executed request. It includes checking the response code to be within the range of 200 to 300 and ensuring that the response payload contains specific keywords like "AWSEBDockerrunVersion" and "containerDefinitions".
Frequently asked questions
What is the purpose of the Dockerrun AWS Configuration Exposure vulnerability test
How does unauthorized access to AWS Dockerrun configuration files impact system integrity and availability
What is the severity level of the Dockerrun AWS Configuration Exposure vulnerability
What category and subcategory does the Dockerrun AWS Configuration Exposure vulnerability fall under
What are the expected response code filters for the vulnerability test
What are the validation criteria for a successful vulnerability test