|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Sitemap.xml File and Directory Enumeration Vulnerability Assessment Details
|
Sitemap.xml File and Directory Enumeration |
||
Checks for a web server's sitemap.xml Detailed Explanation for this Vulnerability Assessment Summary : The remote web server contains a 'sitemap.xml' file. Description : The Sitemap Protocol permits you to inform search engines about URLs on your websites that are available for crawling. In its simplest form, a Sitemap is an XML file that lists URLs for a site. It has been discovered that many site owners are not building their Sitemaps through spidering, but by scripted runs on their web root directory structures. If this is the case, a possible hacker may be able to use sitemaps to to enumerate all files and directories in the webserver root. See also : http://www.quietmove.com/blog/google-sitemap-directory-enumeration-0day/ https://www.google.com/webmasters/sitemaps/docs/en/protocol.html Solution : Site owners should be wary of automatically generating sitemap.xml files, and admins should review the contents of there sitemap.xml file for sensitive material. Network Security Threat Level: None Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2006 SensePost |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |