{"id":974,"date":"2017-03-03T11:55:16","date_gmt":"2017-03-03T11:55:16","guid":{"rendered":"http:\/\/www.haxed.me.uk\/?p=974"},"modified":"2017-03-03T11:57:42","modified_gmt":"2017-03-03T11:57:42","slug":"qid-150004-path-based-vulnerability","status":"publish","type":"post","link":"https:\/\/haxed.me.uk\/index.php\/2017\/03\/03\/qid-150004-path-based-vulnerability\/","title":{"rendered":"QID 150004 : Path-Based Vulnerability"},"content":{"rendered":"<p>A customer of ours had an issue with some paths like theirwebsite.com\/images returning a 200 OK, and although the page was completely blank, and exposed no information it was detected as a positive indicator of exposed data, because of the 200 OK.<\/p>\n<p>more detail: <a href=\"https:\/\/community.qualys.com\/thread\/16746-qid-150004-path-based-vulnerability\">https:\/\/community.qualys.com\/thread\/16746-qid-150004-path-based-vulnerability<\/a><\/p>\n<p>Actually in this case it was a &#8216;whitescreen&#8217;, or just a blank index page, to prevent the Options +indexes in the apache httpd configuration showing the images path. You probably don&#8217;t want this and can just set your Option indexes.<\/p>\n<p>Change from:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nOptions +Indexes\r\n# in older versions it may be defined as\r\nOptions Indexes\r\n<\/pre>\n<p>Change to: <\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nOptions -Indexes\r\n<\/pre>\n<p>This explicitly forbids, but older versions of apache2 might need this written as:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\nOptions Indexes\r\n<\/pre>\n<p>To prevent an attack on .htaccess you could also add this to httpd.conf to ensure the httpd.conf is enforced and takes precedence over any hacker or user that adds indexing incorrectly\/mistakenly\/wrongly;<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\r\n&lt;Directory \/&gt;\r\n    Options FollowSymLinks\r\n    AllowOverride None\r\n&lt;\/Directory&gt;\r\n<\/pre>\n<p>Simple enough.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A customer of ours had an issue with some paths like theirwebsite.com\/images returning a 200 OK, and although the page was completely blank, and exposed no information it was detected as a positive indicator of exposed data, because of the &hellip; <a href=\"https:\/\/haxed.me.uk\/index.php\/2017\/03\/03\/qid-150004-path-based-vulnerability\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,85,61,3],"tags":[],"class_list":["post-974","post","type-post","status-publish","format-standard","hentry","category-apache","category-exploits","category-rackspace","category-security"],"_links":{"self":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/comments?post=974"}],"version-history":[{"count":3,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/974\/revisions"}],"predecessor-version":[{"id":977,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/posts\/974\/revisions\/977"}],"wp:attachment":[{"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/media?parent=974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/categories?post=974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/haxed.me.uk\/index.php\/wp-json\/wp\/v2\/tags?post=974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}