Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Longjing Technology BEMS API 1.21 - Local File Inclusion" module is designed to detect a vulnerability in the Longjing Technology BEMS API version 1.21. This vulnerability allows an attacker to include local files by manipulating the "fileName" parameter in the "downloads" API endpoint. The severity of this vulnerability is classified as high, with a CVSS score of 7.5.
This module was authored by gy741.
A successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the server. In this case, the module specifically targets the "/etc/passwd" file, which contains user account information. By accessing this file, an attacker can gain valuable information about the system, including usernames and user IDs.
The module sends an HTTP GET request to the "/api/downloads" endpoint with a manipulated "fileName" parameter. The module then uses matching conditions to determine if the vulnerability is present.
For example, the module checks if the response contains the string "root:.*:0:0:", which indicates the presence of the root user in the "/etc/passwd" file. Additionally, the module verifies that the response status code is 200, indicating a successful request.
By combining these matching conditions, the module can accurately detect the presence of the local file inclusion vulnerability in the Longjing Technology BEMS API 1.21.