Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Vault Login Panel - Detect

By kannthu

informative
Vidoc logoVidoc Module
#panel#vault
Description

What is the "Vault Login Panel - Detect?"

The "Vault Login Panel - Detect" module is designed to detect the presence of the Vault login panel. Vault is a software that provides secure storage and management of secrets, such as passwords, API keys, and certificates. This module focuses on identifying potential misconfigurations or vulnerabilities related to the Vault login panel.

This module has an informative severity level, which means it provides valuable information but does not indicate a critical security issue.

This module was authored by DhiyaneshDK.

Impact

The impact of the Vault login panel being detected depends on the specific context and configuration of the Vault instance. However, the detection itself does not indicate any immediate security risks or vulnerabilities. It serves as a starting point for further analysis and assessment of the Vault implementation.

How does the module work?

The "Vault Login Panel - Detect" module works by sending an HTTP GET request to the "/ui/vault/auth?with=oidc%2F" endpoint. It then applies a series of matching conditions to determine if the response indicates the presence of the Vault login panel.

The matching conditions include:

- Checking if the response body contains the words "<title>Vault</title>" and "vault/". - Verifying if the response headers include the word "text/html". - Ensuring that the response status code is 200 (OK).

If all of these conditions are met, the module considers the Vault login panel to be detected.

It's important to note that this module is just one test case within the Vidoc platform, which utilizes multiple modules to perform scanning and assessment of various software and configurations.

Concurrent Requests (1)
1. HTTP Request template
GET/ui/vault/auth?with=...
Matching conditions
word: <title>Vault</title>, vault/and
word: text/htmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability