Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Jetbrains WebServers File Exposure" module is designed to detect misconfigurations in Jetbrains IDEs. It specifically targets the presence of a file called "WebServers.xml" that contains webserver credentials with encoded passwords. This module has an informative severity level and was created by geeknik.
If the "WebServers.xml" file is exposed, it could potentially lead to unauthorized access to webserver credentials. This can pose a security risk as sensitive information may be compromised.
The module works by sending HTTP requests to specific paths, including "/.idea/WebServers.xml", "/.idea/webServers.xml", and "/.idea/webservers.xml". It then applies matching conditions to determine if the file is present and accessible.
The matching conditions include:
- Checking the response body for the presence of "" - Checking the response headers for the presence of "application/xml" or "text/xml" - Checking the response status code for a successful response (200)If all of these conditions are met, the module will report a vulnerability.
Example HTTP request:
GET /.idea/WebServers.xml
For more information, you can refer to the Exploit Database entry related to this module.
Metadata:
Verified: true
Google query: intitle:"index of" "WebServers.xml"