Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108346
Category:Web application abuses
Title:SCP/SFTP/FTP Sensitive Data Exposure via Config File (HTTP)
Summary:The script attempts to identify SCP/SFTP/FTP configuration files; containing sensitive data at the remote web server.
Description:Summary:
The script attempts to identify SCP/SFTP/FTP configuration files
containing sensitive data at the remote web server.

Vulnerability Insight:
Currently the script is checking for the following files:

- sftp-config.json (Multiple clients, e.g. Sublime SFTP)

- recentservers.xml, sitemanager.xml, filezilla.xml, FileZilla.xml (FileZilla)

- WS_FTP.ini, ws_ftp.ini, WS_FTP.INI (WS_FTP)

- WinSCP.ini, winscp.ini (WinSCP)

- .vscode/sftp.json (sftp extension for vs code)

- .vscode/ftp-sync.json (Ftp Sync plugin for Visual Studio Code)

- .ftpconfig, .remote-sync.json, deployment-config.json (Remote FTP, Remote Sync and SFTP-Deployment packages for Atom.io)

- ftpsync.settings (FTPSync for Sublime Text)

Vulnerability Impact:
Based on the information provided in these files an attacker might
be able to gather additional info and/or sensitive data like usernames and passwords.

Solution:
A SCP/SFTP/FTP configuration file shouldn't be accessible via a web server.
Restrict access to it or remove it completely.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.