This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Improper Access Control in Gurock TestRail. <br>π₯ **Consequences**: Attackers access `/files.md5` to get a full list of app files & paths.β¦
π‘οΈ **Root Cause**: **Improper Access Control** (IAC). The `/files.md5` file on the client side is accessible without proper restrictions, leaking internal file structures.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: **Gurock Software Gurock TestRail**. <br>π **Versions**: All versions **before 7.2.0.3014**. <br>π **Context**: Web-based QA/test case management software.
π **Self-Check**: <br>1. Visit `http://<target>/files.md5`. <br>2. If you see a list of files/paths, you are **VULNERABLE**. <br>3. Use automated scanners like Nuclei or the Python scripts linked in the data.
π§ **No Patch Workaround**: <br>1. **Block Access**: Configure Web Server (Nginx/Apache) to deny requests to `/files.md5`. <br>2. **WAF Rules**: Add rule to block access to this specific endpoint. <br>3.β¦