Back to Metasploit Framework

Redoc Exposed

documentation/modules/auxiliary/scanner/http/redoc_exposed.md

6.4.1311.2 KB
Original Source

Vulnerable Application

Detects publicly exposed ReDoc API documentation pages by looking for known DOM elements and script names. The module is read-only and sends safe GET requests.

How It Works

  • Prefers DOM checks (<redoc>, #redoc, or scripts containing redoc / redoc.standalone).
  • Falls back to title/body heuristics for “redoc”.
  • Considers only 2xx and 403 responses (avoids noisy redirects).

Verification Steps

  1. Start msfconsole.
  2. use auxiliary/scanner/http/redoc_exposed
  3. set RHOSTS <target-or-range>
  4. (Optional) set SSL true
  5. (Optional) set REDOC_PATHS /redoc,/docs
  6. run

Options

REDOC_PATHS

Comma-separated custom paths to probe. If unset, defaults to /redoc,/redoc/,/docs,/api/docs,/openapi

Scenarios

text
msf6 > use auxiliary/scanner/http/redoc_exposed
msf6 auxiliary(scanner/http/redoc_exposed) > set RHOSTS 192.0.2.0/24
msf6 auxiliary(scanner/http/redoc_exposed) > run
[+] 192.0.2.15 - ReDoc likely exposed at /docs
[*] 192.0.2.23 - no ReDoc found

Notes

  • Stability: CRASH_SAFE (GET requests only).
  • Reliability: No session creation.
  • SideEffects: Requests may appear in server logs (IOC_IN_LOGS).