Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Atom Synchronization Exposure

By kannthu

High
Vidoc logoVidoc Module
#atom#exposure#config#files
Description

What is the "Atom Synchronization Exposure?"

The "Atom Synchronization Exposure" module is designed to detect a misconfiguration vulnerability in the Atom text editor. It targets the remote-sync plugin used for synchronizing files between different instances of Atom. This module has a high severity level and was authored by geeknik.

Impact

This module exposes sensitive information, including usernames and passwords, created by the remote-sync plugin for Atom. It also reveals FTP and/or SCP/SFTP/SSH server details and credentials. This vulnerability can potentially lead to unauthorized access and compromise of the synchronized files.

How the module works?

The "Atom Synchronization Exposure" module works by sending an HTTP GET request to the /.remote-sync.json path. It then applies several matching conditions to determine if the misconfiguration vulnerability exists:

- The response body must contain the words "hostname" and "username". - The response body must also contain either the word "passphrase" or "password". - The response header must include the word "application/json". - The HTTP status code must be 200.

If all of these conditions are met, the module reports the vulnerability.

Example HTTP request:

GET /.remote-sync.json

Note: The actual JSON definitions of the module are not shown here for simplicity.

This module is part of the Vidoc platform, which utilizes multiple modules to perform scanning and identify various security issues.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/.remote-sync.json
Matching conditions
word: "hostname":, "username":and
word: passphrase, passwordand
word: application/jsonand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability