Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Longjing Technology BEMS API 1.21 - Local File Inclusion

By kannthu

High
Vidoc logoVidoc Module
#lfi#packetstorm
Description

What is the "Longjing Technology BEMS API 1.21 - Local File Inclusion?"

The "Longjing Technology BEMS API 1.21 - Local File Inclusion" module is designed to detect a vulnerability in the Longjing Technology BEMS API version 1.21. This vulnerability allows an attacker to include local files by manipulating the "fileName" parameter in the "downloads" API endpoint. The severity of this vulnerability is classified as high, with a CVSS score of 7.5.

This module was authored by gy741.

Impact

A successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the server. In this case, the module specifically targets the "/etc/passwd" file, which contains user account information. By accessing this file, an attacker can gain valuable information about the system, including usernames and user IDs.

How the module works?

The module sends an HTTP GET request to the "/api/downloads" endpoint with a manipulated "fileName" parameter. The module then uses matching conditions to determine if the vulnerability is present.

For example, the module checks if the response contains the string "root:.*:0:0:", which indicates the presence of the root user in the "/etc/passwd" file. Additionally, the module verifies that the response status code is 200, indicating a successful request.

By combining these matching conditions, the module can accurately detect the presence of the local file inclusion vulnerability in the Longjing Technology BEMS API 1.21.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/api/downloads?fileN...
Matching conditions
regex: root:.*:0:0:and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability