Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Laravel Debug Info Leak" module is designed to detect a misconfiguration vulnerability in Laravel applications. Laravel is a popular PHP framework used for web development. This module focuses on identifying instances where debug information is leaked, which can potentially expose sensitive data.
This module has a medium severity level, indicating that it can pose a moderate risk to the security of the application.
Author: pwnhxl
If the "Laravel Debug Info Leak" vulnerability is present, it can lead to the exposure of sensitive information. This includes credentials such as database passwords, Redis passwords, mail passwords, and other sensitive data that should not be accessible to unauthorized users. The leaked information can be exploited by attackers to gain unauthorized access to the application or its underlying systems.
The "Laravel Debug Info Leak" module works by making a POST-based request to the target application. It then analyzes the response to identify specific patterns that indicate the presence of the vulnerability.
Matching conditions:
- The response body must contain the following keywords: "vendor/laravel/framework/src/Illuminate/" and "MethodNotAllowedHttpException". - Alternatively, the response body can contain any of the following keywords: "DB_PASSWORD", "REDIS_PASSWORD", "MAIL_PASSWORD", "ALIYUN_ACCESSKEYSECRET", "ALIYUN_ACCESSKEYID", "SMS_AUTH_TOKEN", or "APP_KEY". - The response status code must be 405 (Method Not Allowed).If all the matching conditions are met, the module flags the presence of the "Laravel Debug Info Leak" vulnerability.
Example HTTP request:
POST / HTTP/1.1
Host: <Hostname>
Note: Replace <Hostname> with the actual hostname of the target application.
For more information, refer to the reference.