Security vulnerabilities

  • Status Closed
  • Assigned To
    cbay
  • Private
Attached to Project: Security vulnerabilities
Opened by yadesh - 23.04.2025
Last edited by cbay - 23.04.2025

FS#158 - Bug Report: Directory Traversal via Sitemap XML Reference

Bug Name:
Directory Traversal through Sitemap Schema Reference

Severity:
Medium to High (Information Disclosure)

URL Affected:
https://www.alwaysdata.com/en/sitemap.xml โ†’ references โ†’ http://www.sitemaps.org/schemas/sitemap/0.9 โ†’ references โ†’ https://www.ietf.org/rfc/

๐Ÿ” Steps to Reproduce:
Go to https://www.alwaysdata.com/en/sitemap.xml.

View the linked schema:

<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
Open the namespace URL: http://www.sitemaps.org/schemas/sitemap/0.9

From that page, locate and visit: https://www.ietf.org/rfc/

Observe that the directory listing is enabled on https://www.ietf.org/rfc/.

๐Ÿงพ Observed Behavior:
The https://www.ietf.org/rfc/ URL is openly listing all files in the directory, including:

PDF documents

HTML versions

JSON files

File sizes and last modified dates

โœ… Expected Behavior:
Directory listing should be disabled to prevent information disclosure.

The endpoint should return a 403 Forbidden or a custom error page.

๐Ÿ“Œ Impact:
Unintended information disclosure through exposed documents and file structures.

Can help attackers understand server structure or gather sensitive metadata.

May affect trust if directory listing is not intended behavior.

poc :

https://drive.google.com/file/d/198YaCBfL4Zn8iAtGN3FdHPg3-JMt-4Q0/view?usp=sharing

Closed by  cbay
23.04.2025 14:25
Reason for closing:  Invalid
Admin
cbay commented on 23.04.2025 14:25

Hello,

https://www.ietf.org/rfc/ is not under our control, it has nothing to do with alwaysdata.

Kind regards,
Cyril

thank u for response

Loading...

Available keyboard shortcuts

Tasklist

Task Details

Task Editing