eSMTP - Config Discovery
eSMTP configuration was discovered.
Security Misconfiguration (SM)
How this template works
APIs Selection
The API selection filters in this template specify the criteria for selecting the API request to be executed. In this case, the filters include the response code range (between 200 and 299) and the extraction of the URL variable.
Execute request
The execute section defines the type of request to be executed, which is a single request in this case. It also specifies the modification of the URL using the extracted URL variable (${urlVar}) to access the .esmtprc file.
Validation
The validation section sets the criteria for validating the response received from the executed request. It checks that the response code is equal to 200, the response payload contains specific keywords (hostname, username, and password), and the response headers contain the value "text/html".
Frequently asked questions
What is the purpose of the eSMTP - Config Discovery test
How does discovering the eSMTP configuration file impact email communications
What category and subcategory does the eSMTPRC_CONFIG vulnerability fall under
What is the severity level of the eSMTPRC_CONFIG vulnerability
What are the potential consequences of not addressing the eSMTPRC_CONFIG vulnerability promptly
What are the validation criteria for a successful eSMTP - Config Discovery test
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling
Explore other tests
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable
circleci config.yml exposure