FTP credentials exposure
Attacker can get unauthorized access of FTP credentials.
Security Misconfiguration (SM)
How this template works
APIs Selection
The template uses API selection filters to specify the criteria for selecting the API requests to be executed. In this case, it filters the requests based on the response code, ensuring that it is greater than or equal to 200 and less than 300. It also extracts the URL from the response and assigns it to the variable "urlVar".
Execute request
The template defines a single request to be executed. It modifies the URL by appending "/ftpsync.settings" to the extracted URL stored in the "urlVar" variable. This modified URL is then used to make the API request.
Validation
After executing the request, the template validates the response. It checks if the response code is equal to 200 and if the response payload contains specific keywords such as "FTPSync", "overwrite_newer_prevention", and "default_folder_permissions". If these conditions are met, the validation is considered successful.
Frequently asked questions
What is the specific vulnerability being tested in this scenario
How can unauthorized access to FTP credentials lead to potential data breaches
What are the potential risks associated with exposing FTP credentials
What are the recommended actions to address the FTP credentials exposure vulnerability
How can organizations protect against FTP credentials exposure
Are there any specific tools or techniques that can help detect and mitigate FTP credentials exposure
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable