In this post we are going to describe how to take advantage of Drupal Views Module Information Disclosure Vulnerability.

As everybody knows, Drupal "is a free and open-source content management framework (CMF) written in PHP and distributed under the GNU General Public License. It is used as a back-end system for at least 2.1% of all websites worldwide ranging from personal blogs to corporate, political, and government sites... It is also used for knowledge management and business collaboration."

First of all, we need to detect some Drupal Installation. We are going to use Shodan. You can use the next query:

After you've selected one of them, we are going to look for all users in the website. You can check the next query:
http://URL/?q=admin/views/ajax/autocomplete/user/e 

In this case, you can see all users that containing "e" in the username.