Skip to content

Commit ea76692

Browse files
committed
Extras module update.
1 parent d7b4800 commit ea76692

File tree

2 files changed

+28
-7
lines changed

2 files changed

+28
-7
lines changed

modules/module_extras.php

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
* License: GNU/GPLv2
99
* @see LICENSE.txt
1010
*
11-
* This file: Optional security extras module (last modified: 2025.09.03).
11+
* This file: Optional security extras module (last modified: 2025.09.22).
1212
*
1313
* False positive risk (an approximate, rough estimate only): « [ ]Low [x]Medium [ ]High »
1414
*/
@@ -224,9 +224,9 @@
224224
} // 2022.06.05 mod 2023.09.04
225225

226226
/** Probing for exposed AWS credentials. */
227-
if ($Trigger(preg_match('~(?:^|[/?])(?:\.?aws_?/(?:config(?:uration)?|credentials?)(?:\.yml)?|\.?aws\.yml|aws[_-]secrets?\.ya?ml|config/aws\.json)(?:$|[/?])~', $LCNrURI), 'Probing for exposed AWS credentials')) {
227+
if ($Trigger(preg_match('~(?:^|[/?])(?:\.?aws_?/(?:config(?:uration)?|credentials?)(?:\.yml)?|\.?aws\.yml|aws[_-]secrets?\.ya?ml|config/aws\.json|\.?aws-credentials\.(?:json|php|ya?ml)?|\.awsvault)(?:$|[/?])~', $LCNrURI), 'Probing for exposed AWS credentials')) {
228228
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed AWS credentials.'], $CIDRAM['BlockInfo']['IPAddr']);
229-
} // 2023.09.04 mod 2025.08.24
229+
} // 2023.09.04 mod 2025.09.22
230230

231231
/** Probing for exposed FTP credentials. */
232232
if ($Trigger(preg_match('~(?:^|[/?])\.?s?ftp-(?:config|sync)\.json(?:$|[/?])~', $LCNrURI), 'Probing for exposed FTP credentials')) {
@@ -284,9 +284,9 @@
284284
} // 2025.08.02
285285

286286
/** Probing for env file. */
287-
if ($Trigger(preg_match('~(?:^|[/?=])(?:config|secrets?)?\.env(?:\.[\da-z]+)*(?:$|[/?])~', $LCNrURI), 'Probing for env file')) {
287+
if ($Trigger(preg_match('~(?:^|[/?=])(?:(?:config|secrets?)?\.env|env\.backup)(?:\.[\da-z]+)*(?:$|[/?])~', $LCNrURI), 'Probing for env file')) {
288288
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for env file.'], $CIDRAM['BlockInfo']['IPAddr']);
289-
} // 2025.03.18 mod 2025.08.24
289+
} // 2025.03.18 mod 2025.09.22
290290

291291
/** Probing for unsecured configuration file. */
292292
if ($Trigger(preg_match('~(?:^|[/?])\.?config.ya?ml(?:$|[/?])~', $LCNrURI), 'Probing for unsecured configuration file')) {
@@ -310,6 +310,16 @@
310310
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed Rails app secrets.'], $CIDRAM['BlockInfo']['IPAddr']);
311311
} // 2025.08.07
312312

313+
/** Probing for exposed Home Assistant secrets. */
314+
if ($Trigger(preg_match('~(?:^|[/?])secrets\.yaml(?:$|[/?])~', $LCNrURI), 'Probing for exposed Home Assistant secrets')) {
315+
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed Home Assistant secrets.'], $CIDRAM['BlockInfo']['IPAddr']);
316+
} // 2025.09.22
317+
318+
/** Probing for exposed BMC secrets. */
319+
if ($Trigger(preg_match('~(?:^|[/?])secrets\.txt(?:$|[/?])~', $LCNrURI), 'Probing for exposed BMC secrets')) {
320+
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed BMC secrets.'], $CIDRAM['BlockInfo']['IPAddr']);
321+
} // 2025.09.22
322+
313323
/** Probing for exposed Apache HTTP authentication credentials. */
314324
if ($Trigger(preg_match('~(?:^|[/?])\.htpasswd(?:$|[/?])~', $LCNrURI), 'Probing for exposed Apache HTTP authentication credentials')) {
315325
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed Apache HTTP authentication credentials.'], $CIDRAM['BlockInfo']['IPAddr']);
@@ -470,9 +480,20 @@
470480
$CIDRAM['Reporter']->report([15], ['Caught probing for exposed etc/shadow file.'], $CIDRAM['BlockInfo']['IPAddr']);
471481
} // 2025.09.03
472482

483+
/** SQL injection attack detection. */
473484
if ($Trigger(preg_match('~\?1\+1&&|\)%7d%7d%2f~', $LCNrURI), 'SQLi attack')) {
474485
$CIDRAM['Reporter']->report([15, 16], ['SQL injection attack detected.'], $CIDRAM['BlockInfo']['IPAddr']);
475486
} // 2025.09.03
487+
488+
/** Probing for exposed Google API credentials. */
489+
if ($Trigger(preg_match('~(?:^|[/?])credentials\.(?:json|txt)(?:$|[/?])~', $LCNrURI), 'Probing for exposed Google API credentials')) {
490+
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed Google API credentials.'], $CIDRAM['BlockInfo']['IPAddr']);
491+
} // 2025.09.22
492+
493+
/** Probing for exposed ELMAH security file. */
494+
if ($Trigger(preg_match('~(?:^|[/?])elmah\.axd(?:$|[/?])~', $LCNrURI), 'Probing for exposed ELMAH security file')) {
495+
$CIDRAM['Reporter']->report([15, 21], ['Caught probing for exposed ELMAH security file.'], $CIDRAM['BlockInfo']['IPAddr']);
496+
} // 2025.09.22
476497
}
477498

478499
/**

modules/modules.dat

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@ module_cookies.php:
220220
module_extras.php:
221221
Name: "Optional security extras module"
222222
False Positive Risk: "Medium"
223-
Version: "2025.247.2"
223+
Version: "2025.264.0"
224224
Dependencies:
225225
PHP: "^5.4|^7|^8"
226226
CIDRAM Core: "^1.13.1|^2.0.1"
@@ -235,7 +235,7 @@ module_extras.php:
235235
- "module_extras.php"
236236
- "module_extras.yaml"
237237
Checksum:
238-
- "7227b98793b48af4ad761f2b3cb858d1f1812f232fc30720fe366c2526c60350:52498"
238+
- "6e4e646a3270d63fb802e48cdfe141dbbfb18748114d0931e7623d12166387f9:53994"
239239
- "7b891d1fa4b1c52c410220bc758e8cb7064bd6040430fb149a5b60e9ae2e0838:890"
240240
Used with: "modules"
241241
Reannotate: "modules.dat"

0 commit comments

Comments
 (0)