How this template works
APIs Selection
The template uses API selection filters to specify the criteria for selecting the API endpoint to test. In this case, it filters based on the response code, ensuring it is between 200 and 299, and also extracts the URL from the response to be used in the subsequent request.
Execute request
The template defines a single request to be executed. It modifies the URL by appending "/cgi-bin/printenv.pl" to the extracted URL variable. This request is sent to the server to test the vulnerability and check if it leaks any sensitive environment variables.
Validation
The template specifies the validation criteria for the response. It checks that the response code is equal to 200 and that the response payload contains any of the specified environment variables, such as 'MYSQL_HOME', 'OPENSSL_CONF', 'REMOTE_ADDR', 'SERVER_ADMIN', or 'Environment Variables'. If the validation criteria are met, it indicates that the vulnerability exists and the server is leaking sensitive information.
Frequently asked questions
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
circleci config.yml exposure