Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

ThinkPHP Errors - Sensitive Information Exposure

By kannthu

Vidoc logoVidoc Module

What is "ThinkPHP Errors - Sensitive Information Exposure?"

The "ThinkPHP Errors - Sensitive Information Exposure" module is designed to detect instances of sensitive information exposure in applications built with the ThinkPHP framework. ThinkPHP is a popular PHP framework used for developing web applications. This module focuses on identifying misconfigurations that may lead to the exposure of sensitive data.

The severity of this module is classified as medium, indicating that the vulnerability it detects could potentially have a significant impact on the security of the application.

This module was authored by j4vaovo.


If sensitive information exposure is detected, it can pose a serious risk to the security and privacy of the application and its users. Exposed information such as database credentials, usernames, passwords, and system error details can be leveraged by attackers to gain unauthorized access, perform further attacks, or compromise the integrity of the application.

How the module works?

The "ThinkPHP Errors - Sensitive Information Exposure" module works by sending HTTP requests to the target application and analyzing the responses for specific patterns and conditions. It uses a set of matching conditions to identify potential instances of sensitive information exposure.

Some of the matching conditions used by this module include:

- Checking for the presence of specific words related to sensitive information, such as database names, usernames, and passwords. - Looking for specific error page titles that indicate a system error has occurred. - Identifying the presence of certain keywords, such as "Exception" and "REQUEST_TIME", which may indicate potential vulnerabilities. - Checking the HTTP response status codes for 200, 500, and 404, which are commonly associated with error conditions.

When a match is found based on these conditions, the module reports a potential instance of sensitive information exposure.

Here is a simplified example of an HTTP request that the module may send:

GET / HTTP/1.1
User-Agent: Vidoc-Scanner

Please note that the actual module definition is not shown here for brevity.

Concurrent Requests (0)
Passive global matcher
word: _DATABASE</td>, _USERNAME</td>, _PASSWOR...and
word: <title>系统发生错误</title>, <title>System Err...and
word: Exception, REQUEST_TIMEand
status: 200, 500, 404
On match action
Report vulnerability