Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

HJTcloud - Local File Inclusion

By kannthu

Vidoc logoVidoc Module

HJTcloud - Local File Inclusion

What is the "HJTcloud - Local File Inclusion?"

The "HJTcloud - Local File Inclusion" module is designed to detect a vulnerability in the HJTcloud software. This vulnerability is classified as CWE-22 and has a severity level of high. The module aims to identify instances where HJTcloud is susceptible to local file inclusion attacks.

Author: pikpikcu


A successful local file inclusion attack on HJTcloud can allow an attacker to access sensitive files and directories on the server. This can lead to unauthorized disclosure of sensitive information, potential data breaches, and even remote code execution.

How the module works?

The module works by sending an HTTP GET request to the HJTcloud system log API endpoint with a specific parameter that includes a file path traversal payload. It then evaluates the response against a set of matching conditions to determine if the vulnerability is present.

Example HTTP request:

GET /him/api/rest/V1.0/system/log/list?filePath=../ HTTP/1.1
Host: [target_host]

The module's matching conditions include:

- The response body must contain specific words related to file information. - The response headers must include the "application/json" content type. - The HTTP status code must be 200.

If all the matching conditions are met, the module reports the vulnerability.


Metadata: max-request: 1

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: "name":, "length":, "filePath":, "list":and
word: application/jsonand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability