Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

MyuCMS - Local File Inclusion

By kannthu

Vidoc logoVidoc Module

What is the "MyuCMS - Local File Inclusion?" module?

The "MyuCMS - Local File Inclusion" module is designed to detect a vulnerability known as local file inclusion (LFI) in the MyuCMS software. LFI is a type of security issue that allows an attacker to include local files on a web server, potentially exposing sensitive information or executing arbitrary code. This module focuses on identifying instances of LFI in the MyuCMS application.

This module has a severity level of high, indicating that if left unaddressed, the LFI vulnerability in MyuCMS could have significant consequences for the security and integrity of the system.

This module was authored by princechaddha.


If the MyuCMS software is vulnerable to local file inclusion, an attacker may be able to access sensitive files on the server, such as configuration files or user credentials. This can lead to unauthorized access, data breaches, and potential compromise of the entire system.

How does the module work?

The "MyuCMS - Local File Inclusion" module works by sending HTTP requests to the target server and analyzing the responses for signs of the LFI vulnerability. It specifically targets the "/index.php/bbs/index/download" endpoint with specific parameters that trigger the LFI behavior.

One example of an HTTP request sent by this module is:

GET /index.php/bbs/index/download?url=/etc/passwd&name=1.txt&local=1

The module then applies matching conditions to the response to determine if the LFI vulnerability is present. In this case, it uses a regular expression matcher to search for the presence of the string "root:.*:0:0:" in the response, indicating the potential inclusion of the "/etc/passwd" file.

If the matching conditions are met, the module will report the vulnerability as a result.

For more information, you can refer to the following resource:


Metadata: max-request: 1

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
regex: root:.*:0:0:
Passive global matcher
No matching conditions.
On match action
Report vulnerability