Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Maccmsv10 - Backdoor Remote Code Execution

By kannthu

Vidoc logoVidoc Module

Maccmsv10 - Backdoor Remote Code Execution

What is the "Maccmsv10 - Backdoor Remote Code Execution?"

The "Maccmsv10 - Backdoor Remote Code Execution" module is designed to detect a backdoor vulnerability in the Maccmsv10 software. Maccmsv10 is a content management system (CMS) that allows users to create and manage websites. This module focuses on identifying a specific vulnerability that can be exploited by remote attackers to execute arbitrary code on the target system.

The severity of this vulnerability is classified as critical, indicating that it poses a significant risk to the security and functionality of the affected system.

This module was authored by princechaddha.


If successfully exploited, the backdoor vulnerability in Maccmsv10 can allow remote attackers to execute arbitrary code on the target system. This can lead to unauthorized access, data breaches, and potential compromise of the entire system. It is crucial to address this vulnerability promptly to prevent any potential security incidents.

How does the module work?

The "Maccmsv10 - Backdoor Remote Code Execution" module works by sending a specific HTTP request to the '/index.php/bbs/index/download' endpoint of the target system. The request is sent using the POST method and includes parameters for downloading a file.

The module includes two matching conditions:

    - The first condition checks the response body for specific words such as "扫描后门" (scan backdoor), "反弹端口" (reverse port), and "文件管理" (file management). If any of these words are found in the response body, it indicates the presence of the backdoor. - The second condition checks the HTTP response status code. It expects a status code of 200, indicating a successful response. If the status code is different, the module will not consider it a match.

By analyzing the response body and status code, the module determines whether the target system is vulnerable to the Maccmsv10 backdoor remote code execution.

Module preview

Concurrent Requests (1)
1. HTTP Request template

Content-Type: application/x-www-fo...

Matching conditions
word: 扫描后门, 反弹端口, 文件管理and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability