Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Schneider Electric Pelco VideoXpert Core Admin Portal - Local File Inclusion

By kannthu

High
Vidoc logoVidoc Module
#schneider#pelco#packetstorm#lfi#videoxpert
Description

What is the "Schneider Electric Pelco VideoXpert Core Admin Portal - Local File Inclusion?"

The "Schneider Electric Pelco VideoXpert Core Admin Portal - Local File Inclusion" module is designed to detect a vulnerability in the Schneider Electric Pelco VideoXpert Core Admin Portal software. This module specifically targets the VideoXpert Core Admin Portal and checks for a local file inclusion (LFI) vulnerability. LFI vulnerabilities can allow an attacker to include and execute arbitrary files from the target system, potentially leading to unauthorized access, data leakage, or remote code execution.

This module has a severity level of high, indicating that the vulnerability it detects can have a significant impact on the security of the target system.

Impact

If the Schneider Electric Pelco VideoXpert Core Admin Portal is vulnerable to local file inclusion, an attacker may be able to access sensitive files on the target system. This could include configuration files, user credentials, or other sensitive information. Additionally, an attacker may be able to execute arbitrary code, potentially leading to further compromise of the system.

How the module works?

The module sends an HTTP GET request to the target system with a specific path that triggers the local file inclusion vulnerability. For example, it may attempt to access the "win.ini" file on a Windows system by using a path traversal technique. The module then checks the response body for specific keywords, such as "bit app support," "fonts," or "extensions," to confirm the presence of the vulnerable file. It also verifies that the HTTP response status code is 200, indicating a successful request.

By matching these conditions, the module can determine if the Schneider Electric Pelco VideoXpert Core Admin Portal is vulnerable to local file inclusion.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/portal//..\\\..\\\....
Matching conditions
word: bit app support, fonts, extensionsand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability