Laravel Telescope Enabled
Laravel Telescope Enabled Misconfiguration.
Security Misconfiguration (SM)
How this template works
APIs Selection
The API selection filters in this template specify the criteria for selecting the API requests to be executed. In this case, the filters include the response code range (between 200 and 299) and the extraction of a URL variable.
Execute request
The execute section of the template defines the type of request to be executed. In this case, it is a single request. The request is modified using the URL variable extracted in the API selection filters section.
Validation
The validation section specifies the criteria for validating the response payload. In this template, the response payload is checked to ensure that it contains specific elements such as the title "Telescope - Laravel" and keywords like "Requests," "Commands," and "Schedule." If the response payload meets these criteria, the validation is considered successful.
Frequently asked questions
What is Laravel Telescope and how does it provide insights into a Laravel application
Why is it considered a misconfiguration to have Laravel Telescope accessible in a production environment
What are the potential consequences of allowing access to Laravel Telescope in a production environment
How can the risk of information leakage through Laravel Telescope be mitigated
What are some of the tags associated with the Laravel Telescope misconfiguration
Are there any references or resources available for further information on Laravel Telescope and the associated misconfiguration
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable