Looking for the vulnerability index of Invicti's legacy products?
JetBrains .idea project directory - Vulnerability Database

JetBrains .idea project directory

Description

The .idea directory is a JetBrains IDE configuration folder that contains project-specific settings and workspace information in XML format. This directory includes sensitive files such as dataSources.ids (which may contain database connection strings and credentials), workspace.xml (containing local development settings, VCS history, and lists of modified files), and other configuration files with compiler settings and module locations. These development artifacts should never be deployed to production environments as they expose internal project structure and potentially sensitive credentials.

Remediation

Remove the .idea directory entirely from production deployments by excluding it from your build and deployment processes. Add .idea/ to your .gitignore file to prevent accidental commits to version control. If the directory is already present on production servers, delete it immediately and configure your web server to block access to any remaining .idea directories.

For Apache web servers, add the following configuration to your virtual host configuration or .htaccess file:

<DirectoryMatch "/\.idea">
    Require all denied
</DirectoryMatch>
For Nginx web servers, add this location block to your server configuration:
location ~ /\.idea {
    deny all;
    return 404;
}
Verify the configuration by attempting to access /.idea/workspace.xml through your web browser - it should return a 403 Forbidden or 404 Not Found error. Additionally, review your deployment pipeline to ensure development files are systematically excluded from production releases.

Related Vulnerabilities