Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Surreal ToDo 0.6.1.2 - Local File Inclusion" module is designed to detect a vulnerability in the Surreal ToDo 0.6.1.2 software. This vulnerability allows for local file inclusion through the index.php file and the content parameter. The severity of this vulnerability is classified as high, with a CVSS score of 7.5.
This module was authored by arafatansari.
A successful exploitation of this vulnerability can lead to unauthorized access to sensitive files on the server. In this case, it allows an attacker to retrieve the contents of the "/etc/passwd" file, which contains user account information.
The module sends an HTTP GET request to the target server with a specific path parameter. In this case, the path parameter is set to "/index.php?content=../../../../../../../../etc/passwd". The module then applies two matching conditions to determine if the vulnerability is present.
The first matching condition uses a regular expression to search for the string "root:[x*]:0:0" in the response. If this string is found, it indicates that the "/etc/passwd" file has been successfully retrieved.
The second matching condition checks the HTTP response status code. If the status code is 200, it confirms that the request was successful.
By combining these matching conditions, the module can accurately detect the presence of the local file inclusion vulnerability in the Surreal ToDo 0.6.1.2 software.
For more information, you can refer to the exploit-db.com reference.