Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Claris FileMaker WebDirect Panel - Detect

By kannthu

Vidoc logoVidoc Module

Claris FileMaker WebDirect Panel - Detect

What it is the "Claris FileMaker WebDirect Panel - Detect?"

The Claris FileMaker WebDirect Panel - Detect module is designed to detect vulnerabilities in the Claris FileMaker WebDirect panel. Claris FileMaker WebDirect is a web interface that allows users to access FileMaker databases using a web browser. This module focuses on identifying potential security weaknesses in the WebDirect panel.

This module has an informative severity level, which means it provides valuable insights and information about potential vulnerabilities without causing any harm.


The impact of vulnerabilities detected by this module can vary depending on the specific misconfiguration or vulnerability found. However, potential consequences may include unauthorized access to sensitive data, data leakage, or other security breaches.

How the module works?

The Claris FileMaker WebDirect Panel - Detect module works by sending HTTP requests to the target system and analyzing the responses. It uses a set of matching conditions to determine if the target system exhibits any signs of vulnerabilities or misconfigurations.

For example, one of the matching conditions checks if the response body contains the HTML title tag "<title>Claris FileMaker WebDirect</title>". This indicates that the target system is running the Claris FileMaker WebDirect panel.

Additionally, the module checks if the response headers include the word "text/html" and if the HTTP status code is 200, indicating a successful response.

By combining these matching conditions, the module can identify instances of the Claris FileMaker WebDirect panel and report any potential vulnerabilities or misconfigurations found.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: <title>Claris FileMaker WebDirect</title...and
word: text/htmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability