Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Generic J2EE LFI Scan Panel - Detect

By kannthu

High
Vidoc logoVidoc Module
#lfi#generic#j2ee
Description

What is the "Generic J2EE LFI Scan Panel - Detect?"

The "Generic J2EE LFI Scan Panel - Detect" module is designed to detect J2EE specific Local File Inclusion (LFI) vulnerabilities. It specifically targets the J2EE software and aims to identify misconfigurations or vulnerabilities related to LFI. This module has a high severity level, indicating the potential impact of the vulnerabilities it detects.

Impact

A successful exploitation of a Local File Inclusion vulnerability can allow an attacker to read sensitive files on the server, including configuration files, source code, and even execute arbitrary code. This can lead to unauthorized access, data leakage, and potential compromise of the entire system.

How the module works?

The "Generic J2EE LFI Scan Panel - Detect" module works by sending HTTP requests to the target server and analyzing the responses. It uses a set of predefined paths to access sensitive files, such as the web.xml file located in the WEB-INF directory. The module checks if the response body contains specific keywords, such as "" and "", indicating the presence of the target file. Additionally, it verifies that the response status code is 200, indicating a successful request.

Here is an example of an HTTP request sent by the module:

GET /../../../../WEB-INF/web.xml HTTP/1.1
Host: example.com

The module uses a combination of matching conditions to determine if a vulnerability is present. It checks both the response body and the response status code. If all the conditions are met, the module reports the vulnerability.

It is important to note that this module is specifically designed for J2EE software and may not be applicable to other types of applications or frameworks.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/../../../../WEB-INF.../../../../WEB-INF/we.../../../WEB-INF/web.x...(+10 paths)
Matching conditions
word: <servlet-name>, </web-app>and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability