Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Django Debug Method Enabled

By kannthu

Vidoc logoVidoc Module

What is the "Django Debug Method Enabled?" module?

The "Django Debug Method Enabled" module is a test case designed to detect misconfigurations in Django applications. It targets the Django framework and specifically checks for the presence of debug mode enabled, which can pose a security risk. This module has a medium severity level and was authored by dhiyaneshDK and hackergautam.


If the "Django Debug Method Enabled" module detects that debug mode is enabled in a Django application, it indicates a potential security vulnerability. Debug mode should not be enabled in a production environment as it can expose sensitive information and allow attackers to gain unauthorized access to the application.

How does the module work?

The "Django Debug Method Enabled" module works by sending an HTTP request to a non-existing path in the target Django application. It then checks for specific response patterns and status codes to determine if debug mode is enabled.

For example, the module may check for the presence of phrases like "URLconf defined," "Page not found," and "Django tried these URL patterns, in this order" in the response body. Additionally, it verifies that the response status code is 404 (Not Found).

The module uses matching conditions to ensure that all specified patterns and status codes are present in the response. If the conditions are met, the module reports a potential misconfiguration.

It's important to note that this module only performs one specific test case and is part of a larger set of modules used by the Vidoc platform for scanning purposes.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: URLconf defined, Page not found, Django ...and
status: 404
Passive global matcher
No matching conditions.
On match action
Report vulnerability