Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Jetty showContexts Enable in DefaultHandler

By kannthu

Low
Vidoc logoVidoc Module
#jetty
Description

What is the "Jetty showContexts Enable in DefaultHandler?" module?

The "Jetty showContexts Enable in DefaultHandler" module is designed to detect misconfigurations in Jetty servers. Jetty is a popular Java-based web server and servlet container. This module focuses on identifying a specific misconfiguration where the Jetty server is configured to display the known contexts. The severity of this misconfiguration is classified as low.

Impact

If the "Jetty showContexts Enable in DefaultHandler" module detects the misconfiguration, it indicates that the Jetty server is revealing sensitive information about the known contexts. This can potentially expose the server to information disclosure attacks and provide valuable information to attackers about the server's configuration and potential vulnerabilities.

How the module works?

The "Jetty showContexts Enable in DefaultHandler" module works by sending an HTTP request to the target server and analyzing the response. It uses two matching conditions to identify the misconfiguration:

- Matcher 1: It checks if the response contains the phrase "Contexts known to this server are:" to determine if the server is displaying the known contexts. - Matcher 2: It verifies that the HTTP response status is 200, indicating a successful request.

If both matching conditions are met, the module reports the misconfiguration as a potential vulnerability.

Example HTTP request sent by the module:

GET / HTTP/1.1
Host: example.com
User-Agent: Vidoc-Scanner

Note: The above example is a simplified representation of the HTTP request sent by the module. The actual request may contain additional headers and parameters depending on the configuration of the Vidoc platform.

Module preview

Concurrent Requests (0)
Passive global matcher
word: Contexts known to this server are:and
status: 200
On match action
Report vulnerability