Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read

By kannthu

High
Vidoc logoVidoc Module
#lfr#edb#lfi#unisharp#laravel
Description

What is the "UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read" module?

The "UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read" module is designed to detect a vulnerability in the UniSharp Laravel File Manager 2.0.0 software. This vulnerability allows an attacker to perform arbitrary file reads, potentially exposing sensitive information.

This module has a severity level of high, indicating the potential impact of the vulnerability.

Impact

If successfully exploited, this vulnerability can allow an attacker to read arbitrary files on the target system. This can lead to the exposure of sensitive information, such as configuration files or user credentials, which can be used for further attacks.

How the module works?

The module sends an HTTP GET request to the "/laravel-filemanager/download" endpoint with specific parameters. It attempts to read the "/etc/passwd" file by manipulating the "working_dir" parameter. The module then applies matching conditions to determine if the vulnerability is present.

The matching conditions include:

- A regular expression match on the response body, looking for the presence of the "root" user entry in the "/etc/passwd" file. - A status code match, checking if the response returns a 200 OK status.

If both matching conditions are met, the module identifies the vulnerability and reports it.

For more information about the UniSharp Laravel File Manager 2.0.0 software and this specific vulnerability, please refer to the original author's documentation.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/laravel-filemanager...
Matching conditions
regex: root:.*:0:0:and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability