Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

ThinkCMF - Local File Inclusion

By kannthu

Vidoc logoVidoc Module

What is "ThinkCMF - Local File Inclusion?"

The "ThinkCMF - Local File Inclusion" module is designed to detect a vulnerability in the ThinkCMF software. ThinkCMF is a content management framework that allows users to build websites and applications. This module specifically targets the ThinkCMF software and checks for a local file inclusion vulnerability.

The severity of this vulnerability is classified as high, indicating that it has the potential to cause significant harm if exploited.

This module was authored by pikpikcu.


A local file inclusion vulnerability in ThinkCMF can allow an attacker to include arbitrary files from the server's filesystem. This can lead to unauthorized access to sensitive information, such as configuration files, user credentials, or other sensitive data stored on the server.

How the module works?

The "ThinkCMF - Local File Inclusion" module works by sending a specific HTTP request to the target server and then analyzing the response. The module checks if the response contains specific words, such as "ThinkCMF," "## README," and "## UPDATE." It also verifies that the response status code is 200.

Here is an example of an HTTP request used by this module:

GET /?a=display&

If the response meets all the matching conditions, the module reports a vulnerability.



CVSS-Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS-Score: 7.5




max-request: 1

win-payload: ../../../../../

Module preview

Concurrent Requests (1)
1. HTTP Request template
Matching conditions
word: ThinkCMF, ## README, ## UPDATEand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability