Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "HJTcloud - Local File Inclusion" module is designed to detect a vulnerability in the HJTcloud software. This vulnerability is classified as CWE-22 and has a severity level of high. The module aims to identify instances where HJTcloud is susceptible to local file inclusion attacks.
Author: pikpikcu
A successful local file inclusion attack on HJTcloud can allow an attacker to access sensitive files and directories on the server. This can lead to unauthorized disclosure of sensitive information, potential data breaches, and even remote code execution.
The module works by sending an HTTP GET request to the HJTcloud system log API endpoint with a specific parameter that includes a file path traversal payload. It then evaluates the response against a set of matching conditions to determine if the vulnerability is present.
Example HTTP request:
GET /him/api/rest/V1.0/system/log/list?filePath=../ HTTP/1.1
Host: [target_host]
The module's matching conditions include:
- The response body must contain specific words related to file information. - The response headers must include the "application/json" content type. - The HTTP status code must be 200.If all the matching conditions are met, the module reports the vulnerability.
Reference: https://mp.weixin.qq.com/s/w2pkj5ADN7b5uxe-wmfGbw
Metadata: max-request: 1