Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Interlib - Local File Inclusion

By kannthu

Vidoc logoVidoc Module

What is "Interlib - Local File Inclusion?"

The "Interlib - Local File Inclusion" module is designed to detect vulnerabilities related to local file inclusion in the Interlib software. Local file inclusion is a type of security vulnerability that allows an attacker to include files from the local file system of the server into the web application. This can lead to unauthorized access to sensitive files and potentially compromise the security of the system.

This module has a high severity level, indicating that it poses a significant risk to the security of the targeted system.

Author: pikpikcu


A successful exploitation of the local file inclusion vulnerability in Interlib can result in unauthorized access to sensitive files on the server. This can include configuration files, user credentials, and other sensitive information. The attacker may be able to gain control over the system, escalate privileges, or launch further attacks.

How the module works?

The "Interlib - Local File Inclusion" module works by sending specific HTTP requests to the target server and analyzing the responses for matching conditions. It checks if the server is vulnerable to local file inclusion by attempting to include files from the local file system using the "/interlib/report/ShowImage" endpoint with parameters like "localPath".

For example, it may send requests like:

GET /interlib/report/ShowImage?localPath=etc/passwd
GET /interlib/report/ShowImage?localPath=C:\Windows\system.ini

The module then applies matching conditions to the responses to determine if the vulnerability is present. It uses regular expressions to search for specific patterns in the response content, such as the presence of "root:.*:0:0:" or "for 16-bit app support". Additionally, it checks if the response status code is 200.

If the matching conditions are met, the module reports the vulnerability, indicating that the target server is vulnerable to local file inclusion.

It is important to note that this module is part of the Vidoc platform, which utilizes multiple modules to perform scanning and testing for various security issues.


Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
regex: root:.*:0:0:, for 16-bit app supportand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability