This is example data. Real dashboards update continuously based on your assets.
Back to Domain Dashboard

Exposed Website Backup File - test.example.com

Demo — read-only

Summary

A publicly accessible backup file, web.zip, containing website content has been identified on test.example.com. This file typically contains source code, configuration files, and other sensitive information related to the website's deployment.

Security Impact

Exposure of website backup files can lead to several security risks, including:

  • Information Disclosure: Attackers can gain access to sensitive data such as database credentials, API keys, configuration settings, and proprietary source code.
  • Further Exploitation: Knowledge of the website's internal structure or identified vulnerabilities within the source code could be used to craft more targeted and effective attacks, potentially leading to remote code execution, data manipulation, or complete system compromise.

How to Verify

To confirm the existence of the exposed backup file, send a GET request to the specified URL.

GET /web.zip HTTP/1.1
Host: test.example.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
Accept: */*

Expected Response: An HTTP 200 OK status code with the response body containing a ZIP archive.

Remediation

  • Remove the file: Immediately delete web.zip from the public-facing web server.
  • Review deployment processes: Ensure that backup files are never stored in publicly accessible directories. Implement secure backup strategies that store backups in offline or restricted storage locations.
  • Restrict access: If backup files must be accessible for specific purposes, implement strong authentication and authorization mechanisms to limit access only to authorized personnel.

If you encountered an issue or false positive, contact [email protected].

ExposureIntel - Attack Surface Management Tools | External Asset Discovery & Exposure Monitoring