Bulk Directory Listing Exposure on Multiple NASA Subdomains

Disclosed by
KIRAN-KUMAR-K
Summary by National Aeronautics and Space Administration (NASA) - Vulnerability Disclosure Program

Directories are supposed to be public and visible to the world, to help with contributor development as well as mirror sites around the world.

Summary by KIRAN-KUMAR-K

Bulk Directory Listing Exposure on Multiple NASA Subdomains

A security vulnerability has been identified across multiple NASA subdomains, where improper server configurations have resulted in public directory listings being exposed. These misconfigurations allow unauthorized access to directory structures, potentially revealing sensitive files, backup data, and configuration settings that should remain restricted.

Affected URLs:

Security Impact:

  • Unauthorized access to directory structures and stored files
  • Potential leakage of configuration files, backup data, and sensitive assets
  • Increased risk of reconnaissance attacks leading to further exploitation

Recommended Mitigation Measures:

  1. Disable Directory Listing:
    • For Apache, add Options -Indexes to the .htaccess or server configuration.
    • For Nginx, set autoindex off; in the configuration file.
  2. Implement Strict Access Controls:
    • Restrict public access to directories containing sensitive files.
    • Review and enforce least privilege permissions to minimize exposure.

Conclusion:

Ensuring proper server configuration is critical to maintaining security and preventing unauthorized access to sensitive data. This disclosure aims to raise awareness and encourage best practices in securing web infrastructure.

Kiran Kumar K

Ethical Hacker | VAPT Professional

Activity