Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Kingdee EAS - Local File Inclusion" module is designed to detect a vulnerability in the Kingdee EAS OA server_file. This vulnerability allows attackers to exploit a local file inclusion vulnerability, potentially leading to the disclosure of sensitive server information. The severity of this vulnerability is classified as high.
This module was authored by ritikchaddha.
If successfully exploited, the "Kingdee EAS - Local File Inclusion" vulnerability can allow attackers to obtain sensitive server information. This can include files and directories that are not intended to be publicly accessible. The disclosure of such information can potentially aid attackers in further compromising the system or conducting targeted attacks.
The "Kingdee EAS - Local File Inclusion" module works by sending HTTP requests to specific endpoints of the Kingdee EAS OA server_file. It then applies a set of matching conditions to determine if the vulnerability is present.
An example of an HTTP request sent by this module is:
GET /appmonitor/protected/selector/server_file/files?folder=C://&suffix= HTTP/1.1
Host: [target_host]
The module's matching conditions include:
- The response body must contain the following JSON objects: {"name":"Windows","path":"C:\\Windows","folder":true} or {"name":"root","path":"/root","folder":true} - The response headers must include the "application/json" content type - The response status code must be 200If all of these conditions are met, the module reports the presence of the vulnerability.