Golang expvar Information Disclosure
Attacker can get unauthorized access of Golang expvar information.
Security Misconfiguration (SM)
How this template works
The template uses API selection filters to specify the criteria for selecting the API endpoint to test. In this case, the filters are based on the response code and URL. The filters ensure that the response code is between 200 and 299 (inclusive) and extract the URL into a variable called "urlVar".
The template uses the "execute" section to define the type of request to be executed. In this case, it is a single request. The request is modified using the "modify_url" action, where the URL variable "urlVar" is appended with "/debug/vars". This modifies the URL to target the "/debug/vars" endpoint.
The template specifies the validation criteria in the "validate" section. It checks that the response code is equal to 200 and that the response payload contains the strings '"memstats":' and '"cmdline":'. These validations ensure that the request was successful and that the response contains the expected information related to Golang expvar. Note: The instructions explicitly state not to add anything at the beginning or end of the answer.
Frequently asked questions
What is Golang expvar Information Disclosure vulnerability
How can attackers exploit Golang expvar Information Disclosure vulnerability
What are the potential impacts of Golang expvar Information Disclosure vulnerability
What category does Golang expvar Information Disclosure vulnerability fall under
What is the severity level of Golang expvar Information Disclosure vulnerability
Are there any references or resources available for further information on Golang expvar Information Disclosure vulnerability