Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Jetbrains WebServers File Exposure

By kannthu

Informative
Vidoc logoVidoc Module
#jetbrains#config#edb#files
Description

What is the "Jetbrains WebServers File Exposure?"

The "Jetbrains WebServers File Exposure" module is designed to detect misconfigurations in Jetbrains IDEs. It specifically targets the presence of a file called "WebServers.xml" that contains webserver credentials with encoded passwords. This module has an informative severity level and was created by geeknik.

Impact

If the "WebServers.xml" file is exposed, it could potentially lead to unauthorized access to webserver credentials. This can pose a security risk as sensitive information may be compromised.

How does the module work?

The module works by sending HTTP requests to specific paths, including "/.idea/WebServers.xml", "/.idea/webServers.xml", and "/.idea/webservers.xml". It then applies matching conditions to determine if the file is present and accessible.

The matching conditions include:

- Checking the response body for the presence of "" - Checking the response headers for the presence of "application/xml" or "text/xml" - Checking the response status code for a successful response (200)

If all of these conditions are met, the module will report a vulnerability.

Example HTTP request:

GET /.idea/WebServers.xml

For more information, you can refer to the Exploit Database entry related to this module.

Metadata:

Verified: true

Google query: intitle:"index of" "WebServers.xml"

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/.idea/WebServers.xm.../.idea/webServers.xm.../.idea/webservers.xm...
Matching conditions
word: <?xml, WebServers, </project>and
word: application/xml, text/xmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability