SFTP Config File Disclosure
Detects the exposure of SFTP configuration files.
Security Misconfiguration (SM)
How this template works
The API selection filters in this template specify the criteria for selecting the API to be tested. In this case, the filters include the response code range (greater than or equal to 200 and less than 300) and the extraction of the URL into a variable called "urlVar".
The execute section defines the type of request to be executed. In this template, it is set to "single", indicating that a single request will be made. The request is specified under the "requests" field, where the URL is modified using the value extracted in the API selection filters.
The validation section defines the criteria for validating the response received from the API. In this template, the response code is checked to be equal to 200, and the response payload is checked to contain specific keywords such as "host", "user", "password", and "remote_path". If the validation criteria are met, the test is considered successful.
Frequently asked questions
What is the purpose of this test
How does the test identify the presence of SFTP configuration files
What is the impact of exposing SFTP configuration files
What category and severity level does this test fall under
What are the references for this test
What are the validation criteria for a successful test