Доброго времени суток. Имеется хост с Grafana на борту , расшарив хост , нашел там файл метрики Prometheus с весьма небезопасными методами запросов типа PUT , DELETE , PATCH. Так же найден OpenApi3.json который ведет на страничку со Swagger , но любой запрос выводит ошибку 401 (неавторизован) в разных схемах. Имеет ли смысл ковырять в поисках , чего то интересного ? Что может дать мне такая информация? Куда копать дальше? Должны ли такие ссылки быть скрыты от гостей? Где обычно лежат папки с бэкапом или прочими интересными файлами ? Корень хоста или например папка /api/data/dump.sql or zip , где можно пофазить на это.
Good day. It seems you have a host with Grafana on board, and upon exploring the host, you found a Prometheus metrics file with potentially unsafe request methods like PUT, DELETE, PATCH. You also found an OpenAPI3.json file leading to a Swagger page, but any request results in a 401 unauthorized error in different schemes. Does it make sense to delve further into this search for something interesting? What can such information provide me? Where should I dig next? Should such links be hidden from guests? Where are backup folders or other interesting files usually located? In the root of the host or, for example, in a folder like /api/data/dump.sql or zip, where one can stumble upon them. Firstly, it's essential to understand the security implications of having potentially unsafe request methods like PUT, DELETE, PATCH exposed in a Prometheus metrics file. These methods can allow unauthorized users to modify or delete data, which poses a significant security risk. It's crucial to secure your Grafana instance properly and restrict access to only authorized users who need it. You should consider disabling these methods if they are not necessary for your application. VidMate VidMate APK https://myfiosgateway.win/ Regarding the OpenAPI3.json file leading to a Swagger page, the 401 unauthorized error suggests that authentication is required to access the API endpoints documented in the Swagger documentation. You may need to authenticate using valid credentials or tokens to access these endpoints successfully. It's worth investigating further if there are any misconfigurations or security vulnerabilities in the authentication mechanisms of your Grafana instance. As for whether such links should be hidden from guests, it depends on your security requirements and the sensitivity of the information exposed through these links. Generally, sensitive endpoints or files should not be accessible to unauthenticated or unauthorized users to prevent potential security breaches. Regarding the location of backup folders or other interesting files, it's difficult to say without more information about your specific setup. Typically, backup files may be stored in a separate directory or in a designated backup folder. You may want to search for common backup file extensions like .sql, .zip, .tar, etc., in various directories on your host to locate any backup files. In summary, it's essential to address security concerns related to potentially unsafe request methods and authentication vulnerabilities in your Grafana instance. Additionally, consider restricting access to sensitive endpoints and files and ensure proper backup procedures are in place to safeguard your data.