Skip to content

Commit 67490e4

Browse files
authored
Create redoc_exposed.md
1 parent fc35a8a commit 67490e4

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
## Summary
2+
This module detects publicly exposed **ReDoc** API documentation pages.
3+
It performs safe, read-only HTTP GET requests and reports likely ReDoc instances based on common HTML markers.
4+
5+
## Module name
6+
`auxiliary/scanner/http/redoc_exposed`
7+
8+
## Options
9+
* **RPORT** – Target TCP port (default: 80)
10+
* **SSL** – Enable TLS (default: false)
11+
* **REDOC_PATHS** – Optional comma-separated list of paths to probe. When unset, the module probes: `/redoc, /redoc/, /docs, /api/docs, /openapi`.
12+
13+
## Verification steps
14+
1. Start `msfconsole`
15+
2. `use auxiliary/scanner/http/redoc_exposed`
16+
3. `set RHOSTS <target or file:/path/to/targets.txt>`
17+
4. (Optional) `set REDOC_PATHS /redoc,/docs`
18+
5. (Optional) `set RPORT <port>` and/or `set SSL true`
19+
6. `run`
20+
21+
### Expected
22+
23+
`[+] <ip> - ReDoc likely exposed at <path>`
24+
25+
### Scanning notes
26+
- DOM-driven checks via `get_html_document`:
27+
- `<redoc>` / `redoc-` custom elements
28+
- `#redoc` container
29+
- `<script src="...redoc(.standalone).js">`
30+
- Falls back to body/title heuristics if DOM parsing is unavailable.
31+
- No intrusive actions; **read-only** HTTP GET requests only.
32+
33+
### Example session
34+
35+
use auxiliary/scanner/http/redoc_exposed
36+
set RHOSTS 127.0.0.1
37+
set RPORT 8001
38+
set SSL false
39+
run

0 commit comments

Comments
 (0)