Redis Configuration File Exposure
Redis configuration file (redis.conf) was exposed.
Security Misconfiguration (SM)
How this template works
The API selection filters in this template specify the criteria for selecting the API to be tested. In this case, the filters include the response code range (between 200 and 299) and the extraction of the URL from the response to be used in the subsequent request.
The execute section defines the type of request to be executed. In this template, a single request is made to modify the URL by appending "/redis.conf" to it. This request aims to access the Redis configuration file.
The validation section specifies the conditions that need to be met for the response to be considered valid. In this template, the response code should be 200, the response payload should contain specific keywords related to the Redis configuration file, and the response headers should contain the value "application/octet-stream". These validations ensure that the Redis configuration file is successfully accessed and contains the expected information.
Frequently asked questions
What is the purpose of this test
How does the test determine if the Redis configuration file is exposed
What are the potential impacts of exposing the Redis configuration file
What category and subcategory does this test fall under
What are the validation criteria for a successful test
What are the references for further information on Redis configuration