Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Laravel Debug Info Leak

By kannthu

Medium
Vidoc logoVidoc Module
#misconfig#laravel#debug#infoleak
Description

What is the "Laravel Debug Info Leak?"

The "Laravel Debug Info Leak" module is designed to detect a misconfiguration vulnerability in Laravel applications. Laravel is a popular PHP framework used for web development. This module focuses on identifying instances where debug information is leaked, which can potentially expose sensitive data.

This module has a medium severity level, indicating that it can pose a moderate risk to the security of the application.

Author: pwnhxl

Impact

If the "Laravel Debug Info Leak" vulnerability is present, it can lead to the exposure of sensitive information. This includes credentials such as database passwords, Redis passwords, mail passwords, and other sensitive data that should not be accessible to unauthorized users. The leaked information can be exploited by attackers to gain unauthorized access to the application or its underlying systems.

How the module works?

The "Laravel Debug Info Leak" module works by making a POST-based request to the target application. It then analyzes the response to identify specific patterns that indicate the presence of the vulnerability.

Matching conditions:

- The response body must contain the following keywords: "vendor/laravel/framework/src/Illuminate/" and "MethodNotAllowedHttpException". - Alternatively, the response body can contain any of the following keywords: "DB_PASSWORD", "REDIS_PASSWORD", "MAIL_PASSWORD", "ALIYUN_ACCESSKEYSECRET", "ALIYUN_ACCESSKEYID", "SMS_AUTH_TOKEN", or "APP_KEY". - The response status code must be 405 (Method Not Allowed).

If all the matching conditions are met, the module flags the presence of the "Laravel Debug Info Leak" vulnerability.

Example HTTP request:

POST / HTTP/1.1
Host: <Hostname>

Note: Replace <Hostname> with the actual hostname of the target application.

For more information, refer to the reference.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Raw request
Matching conditions
word: vendor/laravel/framework/src/Illuminate/...and
word: DB_PASSWORD, REDIS_PASSWORD, MAIL_PASSWO...and
status: 405
Passive global matcher
No matching conditions.
On match action
Report vulnerability