Looking for the vulnerability index of Invicti's legacy products?
Joe Editor DEADJOE file - Vulnerability Database

Joe Editor DEADJOE file

Description

A DEADJOE file has been detected in the web-accessible directory. This file is automatically created by the Joe text editor when it terminates abnormally (such as during a crash or forced termination). The file contains unsaved changes and buffer contents from the editing session at the time of the crash.

When exposed through a web server, this file may reveal sensitive information including source code fragments, configuration data, credentials, or internal system paths that were being edited. Attackers can access this file directly via HTTP requests, potentially gaining insight into the application's internal structure and sensitive data.

Remediation

Take the following steps to remediate this vulnerability:

1. Immediate Action:
• Locate and delete all DEADJOE files from web-accessible directories
• Search recursively for these files using:

find /var/www -name "DEADJOE" -type f

2. Prevent Web Access:
• Configure your web server to deny access to DEADJOE files. For Apache, add to .htaccess or server configuration:
<Files "DEADJOE">
    Require all denied
</Files>
• For Nginx, add to server configuration:
location ~* /DEADJOE$ {
    deny all;
    return 404;
}

3. Long-term Prevention:
• Avoid using text editors like Joe directly on production systems
• Edit files in development environments and deploy through proper CI/CD pipelines
• Implement automated scanning to detect and remove temporary editor files before deployment
• Configure Joe editor to save DEADJOE files to a non-web-accessible location using the -deadjoe option

Related Vulnerabilities