Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sitemap.xml File and Directory Enumeration

Vulnerability Assessment Details

Sitemap.xml File and Directory Enumeration

Vulnerability Assessment Summary
Checks for a web server's sitemap.xml

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote web server contains a 'sitemap.xml' file.

Description :

The Sitemap Protocol permits you to inform search engines about URLs on
your websites that are available for crawling. In its simplest form,
a Sitemap is an XML file that lists URLs for a site.

It has been discovered that many site owners are not building their
Sitemaps through spidering, but by scripted runs on their web root
directory structures. If this is the case, a possible hacker may be able to
use sitemaps to to enumerate all files and directories in the
webserver root.

See also :

Solution :

Site owners should be wary of automatically generating sitemap.xml
files, and admins should review the contents of there sitemap.xml file
for sensitive material.

Network Security Threat Level:


Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 SensePost

Cables, Connectors


No Discussions have been posted on this vulnerability.