Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Eclipse BIRT Panel - Detect

By kannthu

Informative
Vidoc logoVidoc Module
#panel#eclipsebirt#detect
Description

What is the "Eclipse BIRT Panel - Detect" module?

The "Eclipse BIRT Panel - Detect" module is designed to detect the presence of Eclipse BIRT (Business Intelligence Reporting Tool) software. It is a test case used in the Vidoc platform to identify instances of Eclipse BIRT and provide information about its configuration.

This module has an informative severity level, meaning it provides valuable insights but does not indicate a vulnerability or misconfiguration.

This module was authored by Shiva from Strobes Security.

Impact

The impact of this module is purely informative. It does not indicate any specific security risks or vulnerabilities. Instead, it helps users identify the presence of Eclipse BIRT software within their systems.

How does the module work?

The "Eclipse BIRT Panel - Detect" module works by sending HTTP requests to the target system and applying matching conditions to determine if Eclipse BIRT is present. The module uses the following matching conditions:

- Matcher 1: The response body should contain the words "alt="Eclipse Logo" or "Eclipse BIRT Home". This condition is case-insensitive. - Matcher 2: The response status code should be 200.

If both matching conditions are met, the module considers Eclipse BIRT detected.

Here is an example of an HTTP request sent by the module:

GET /reportviewer/ HTTP/1.1
Host: [target_host]

The module sends this request to the target system and checks if the response body contains the specified words and if the response status code is 200.

By using these matching conditions, the module can accurately identify instances of Eclipse BIRT.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/reportviewer/
Matching conditions
word: alt="Eclipse Logo, Eclipse BIRT Homeand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability