Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Kingdee EAS - Local File Inclusion

By kannthu

Vidoc logoVidoc Module

What is "Kingdee EAS - Local File Inclusion?"

The "Kingdee EAS - Local File Inclusion" module is designed to detect a vulnerability in the Kingdee EAS OA server_file. This vulnerability allows attackers to exploit a local file inclusion vulnerability, potentially leading to the disclosure of sensitive server information. The severity of this vulnerability is classified as high.

This module was authored by ritikchaddha.


If successfully exploited, the "Kingdee EAS - Local File Inclusion" vulnerability can allow attackers to obtain sensitive server information. This can include files and directories that are not intended to be publicly accessible. The disclosure of such information can potentially aid attackers in further compromising the system or conducting targeted attacks.

How the module works?

The "Kingdee EAS - Local File Inclusion" module works by sending HTTP requests to specific endpoints of the Kingdee EAS OA server_file. It then applies a set of matching conditions to determine if the vulnerability is present.

An example of an HTTP request sent by this module is:

GET /appmonitor/protected/selector/server_file/files?folder=C://&suffix= HTTP/1.1
Host: [target_host]

The module's matching conditions include:

- The response body must contain the following JSON objects: {"name":"Windows","path":"C:\\Windows","folder":true} or {"name":"root","path":"/root","folder":true} - The response headers must include the "application/json" content type - The response status code must be 200

If all of these conditions are met, the module reports the presence of the vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: {"name":"Windows","path":"C:\\\\Windows"...and
word: application/jsonand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability