From 5f11cd3a39fc1c97014bc9ac57f30cde8cc9bfc5 Mon Sep 17 00:00:00 2001 From: Shubham Dhamal Date: Fri, 26 Sep 2025 18:52:16 +0530 Subject: [PATCH] Created origin ip disclosure security report Signed-off-by: Shubham Dhamal --- Origin-IP-Disclosure.md | 67 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 Origin-IP-Disclosure.md diff --git a/Origin-IP-Disclosure.md b/Origin-IP-Disclosure.md new file mode 100644 index 0000000..340187a --- /dev/null +++ b/Origin-IP-Disclosure.md @@ -0,0 +1,67 @@ +# Security Report: Origin IP Disclosure & phpinfo() Exposure + +## Summary + +The application at: + +- https://tb.aixblock.io/dashboard/phpinfo.php + +exposes the full PHP configuration page (`phpinfo()`). This page reveals sensitive details such as: + +- PHP version +- Installed modules +- OS paths +- **Server’s origin IP address: `69.197.168.145`** + +Since the application is deployed behind Cloudflare, the **origin IP should remain hidden**. +However, direct access to the origin IP confirms that Cloudflare can be bypassed by targeting the origin server directly. + +--- + +## Severity +**High** + +--- + +## Impact +- Cloudflare WAF and security protections can be bypassed. +- Attackers may launch direct DDoS, brute-force, or vulnerability exploitation attacks against the origin server. +- `phpinfo()` output increases the attack surface by revealing configuration and environment details that can assist in tailored exploits. + +--- + +## Steps to Reproduce +1. Visit: + `https://tb.aixblock.io/dashboard/phpinfo.php` + → Observe full PHP info output including server IP. + + image + + +2. Visit: + `http://69.197.168.145/dashboard/phpinfo.php` + → Same content loads, confirming direct origin server access. + + +--- + +## Expected Behavior +- `phpinfo.php` should not be publicly accessible. +- Origin IP should not be directly reachable. + +--- + +## Remediation +1. Remove `/phpinfo.php` from the production environment immediately. +2. Restrict direct access to the origin server (`69.197.168.145`) at the firewall level, allowing only Cloudflare’s IP ranges. +3. Ensure security headers and server hardening are in place to minimize information leakage. + +--- + +## References +- [Cloudflare: Protecting Origin Servers](https://developers.cloudflare.com/origin-configuration/) +- [OWASP Information Disclosure](https://owasp.org/www-community/attacks/Information_exposure_through_query_strings_in_url) + +--- + +**Reporter:** `shubhamdhamal`