Misconfiguration & Information Disclosure¶
Misconfigurations expose sensitive data through debug endpoints, backup files, admin panels, and CORS issues.
Common Sensitive Paths¶
# Debug/Info
/phpinfo.php, /info.php
/elmah.axd, /elmah.axd/download
/debug/pprof/, /debug/pprof/heap
/crx/de, /crxde/index.jsp
/status, /health, /metrics
# Source Control
/.git/, /.svn/, /.env
# Backups
/backup/, /backups/, /db/
/backup.sql, /db.sql, /site_backup.tar.gz
# Admin
/admin/, /administrator/, /wp-admin/
Attack Vectors¶
PHP Information Disclosure¶
Reveals: PHP version, OS, config, extensions, environment variables.
ELMAH Error Logging (ASP.NET)¶
/elmah.axd # List all errors
/elmah.axd/download # Download full log
/elmah.axd/detail?id={ID} # Specific error
Leaks: Cookies, IP addresses, file paths, stack traces, verification tokens.
Golang pprof Debugger¶
Exposes: Memory dumps, goroutines, profiling data.
Adobe Experience Manager (AEM)¶
Admin Panel Discovery¶
Auto-authentication bug: Navigate to /admin/ and check for "log out" option.
Backup File Locations¶
Database:
Configuration:
/.env, /.env.local, /.env.production
/config.php, /settings.ini, /database.yml
/.htaccess, /web.config, /nginx.conf
S3 Bucket Misconfigurations¶
aws s3 ls s3://{bucket}/
aws s3 ls s3://{bucket}/admin/
aws s3 ls s3://{bucket}/production/
aws s3 ls s3://{bucket}/backup/
API Key Leaks¶
JavaScript source:
Check: *.js, bundles, configuration files.
CORS Misconfigurations¶
Vulnerable response:
Subdomain Takeover¶
Indicators: - CNAME pointing to unclaimed service - "There isn't a GitHub Pages site here" - "NoSuchBucket" (AWS S3) - 404 from third-party service
Common services: AWS S3, GitHub Pages, Heroku, Azure, Fastly
Bypasses¶
Admin panel:
Rate limiting:
Real Examples¶
| Target | Finding | Impact |
|---|---|---|
| HackerOne #1050912 | /phpinfo exposed | Config leak |
| HackerOne #1139340 | ELMAH leaked cookies | Session theft |
| Uber #1385906 | /debug/pprof/ exposed | Runtime profiling |
| HackerOne #1095830 | AEM CRXDE unauth | Admin access |
| DoD #1062803 | S3 bucket public | Data exposure |
Tools¶
Directory discovery:
# Dirsearch
dirsearch -u https://target.com -e php,asp,aspx,jsp,html,txt,bak
# ffuf
ffuf -u https://target.com/FUZZ -w wordlist.txt
# nuclei
nuclei -u https://target.com -t misconfigurations/
S3 tools:
Subdomain takeover: - subjack — Scanner - can-i-take-over-xyz — Fingerprint database - nuclei — Takeover templates