Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "ThinkCMF - Local File Inclusion" module is designed to detect a vulnerability in the ThinkCMF software. ThinkCMF is a content management framework that allows users to build websites and applications. This module specifically targets the ThinkCMF software and checks for a local file inclusion vulnerability.
The severity of this vulnerability is classified as high, indicating that it has the potential to cause significant harm if exploited.
This module was authored by pikpikcu.
A local file inclusion vulnerability in ThinkCMF can allow an attacker to include arbitrary files from the server's filesystem. This can lead to unauthorized access to sensitive information, such as configuration files, user credentials, or other sensitive data stored on the server.
The "ThinkCMF - Local File Inclusion" module works by sending a specific HTTP request to the target server and then analyzing the response. The module checks if the response contains specific words, such as "ThinkCMF," "## README," and "## UPDATE." It also verifies that the response status code is 200.
Here is an example of an HTTP request used by this module:
GET /?a=display&templateFile=README.md
If the response meets all the matching conditions, the module reports a vulnerability.
Classification:
CWE-ID: CWE-22
CVSS-Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS-Score: 7.5
Reference:
- https://www.freebuf.com/vuls/217586.html
Metadata:
max-request: 1
win-payload: ../../../../../