Parameters.yml - File Discovery
Parameters.yml was discovered.
Security Misconfiguration (SM)
How this template works
APIs Selection
The API selection filters in this template specify the criteria for selecting the APIs to be tested. In this case, the filters include the response code range (greater than or equal to 200 and less than 300) and the extraction of the "urlVar" variable from the response URL.
Execute request
The execute section of the template defines the type of request to be executed, which is "single" in this case. It also specifies the requests to be made, where the "modify_url" action is performed on the URLs generated from the "urlPaths" word list.
Validation
The validation section sets the criteria for validating the response of the executed request. It checks that the response code is equal to 200 and that the response payload contains specific strings, such as "parameters:", "database_user", and "database_password". If these conditions are met, the validation is considered successful.
Frequently asked questions
What is the purpose of the parameters.yml file in Symfony-based applications
How can the exposure of the parameters.yml file lead to security vulnerabilities
What are the potential consequences of exposing the parameters.yml file
What category does the vulnerability related to the parameters.yml file fall under
What are some common paths that the test will check for the presence of the parameters.yml file
What are the validation criteria used to determine if the parameters.yml file is exposed
"The text editor in Akto is absolutely remarkable. Its user-friendly YAML format strikes the perfect balance between simplicity and power. With intuitive features like 'API selection filter', 'Execute', Validate' creating test rules becomes incredibly easy. Akto's test editor is a game-changer, enabling seamless creation of highly personalized and effective tests that could meet the needs of any modern day organization. "

Security team,
Rippling
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable
circleci config.yml exposure