Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

CX Cloud Unauthenticated Upload - Detect

By kannthu

Vidoc logoVidoc Module

What is the "CX Cloud Unauthenticated Upload - Detect?" module?

The "CX Cloud Unauthenticated Upload - Detect" module is designed to detect unauthenticated file uploads in the CX Cloud software. It is a test case that helps identify potential misconfigurations or vulnerabilities related to file uploads. The severity of this module is classified as informative, meaning it provides valuable information without posing an immediate threat. This module was authored by dhiyaneshDk.


This module aims to identify instances of unauthenticated file uploads in the CX Cloud software. Unauthenticated file uploads can pose security risks as they may allow unauthorized users to upload malicious files, potentially leading to further exploitation or compromise of the system.

How does the module work?

The "CX Cloud Unauthenticated Upload - Detect" module works by sending a GET request to the "/upload.jsp" path. It then applies a matching condition to check if the response contains the HTML code "". If this condition is met, the module considers it a positive match for an unauthenticated file upload vulnerability.

By analyzing the response of the GET request and applying the matching condition, the module can determine if the CX Cloud software is susceptible to unauthenticated file uploads.

It is important to note that this module is just one test case within the Vidoc platform, which utilizes multiple modules to perform comprehensive scanning and detection of various vulnerabilities, misconfigurations, and software fingerprints.

The metadata associated with this module includes the maximum number of requests to be made, which is set to 1.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: <HEAD><TITLE>Display file upload form to...
Passive global matcher
No matching conditions.
On match action
Report vulnerability