Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

FatPipe WARP 10.2.2 - Authorization Bypass

By kannthu

Vidoc logoVidoc Module

What is the "FatPipe WARP 10.2.2 - Authorization Bypass?"

The "FatPipe WARP 10.2.2 - Authorization Bypass" module is designed to detect an authorization bypass vulnerability in the FatPipe WARP 10.2.2 software. This vulnerability allows attackers to bypass proper authorization and gain access to resources behind protected pages. The severity of this vulnerability is classified as high.

This module was authored by gy741.


An authorization bypass vulnerability in FatPipe WARP 10.2.2 can have serious consequences. By exploiting this vulnerability, attackers can gain unauthorized access to sensitive resources and potentially compromise the security of the system. This can lead to data breaches, unauthorized modifications, and other malicious activities.

How the module works?

The "FatPipe WARP 10.2.2 - Authorization Bypass" module works by sending an HTTP request to the target system and analyzing the response. The module checks for specific conditions in the response to determine if the authorization bypass vulnerability is present.

Here is an example of an HTTP request used by the module:

GET /fpui/jsp/index.jsp HTTP/1.1
Host: <Hostname>
Accept: */*

The module then applies matching conditions to the response to identify the presence of the vulnerability. In this case, the module checks for a successful HTTP status code (200) and specific words in the response, such as "productType," "type," "version," and "". If all the conditions are met, the module reports the vulnerability.

It is important to note that this module is designed to detect the vulnerability, not fix it. Once the vulnerability is identified, appropriate actions should be taken to address and mitigate the issue.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Raw request
Matching conditions
status: 200and
word: productType, type:, version:, <title>Fat...
Passive global matcher
No matching conditions.
On match action
Report vulnerability