Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Windows - Local File Inclusion

By kannthu

High
Vidoc logoVidoc Module
#azure#windows#lfi#generic
Description
Author: mesaglio,sushantkamble,ritikchaddha Classification CWE-ID: CWE-22 CVSS-Metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS-Score: 7.5 Windows is vulnerable to local file inclusion because of searches for /windows/win.ini on passed URLs. Metadata max-request: 22

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/..0x5c..0x5c..0x5c...././../../../../../...../.%252e/.%252e/.%252...(+19 paths)
Matching conditions
word: bit app support, fonts, extensions
Passive global matcher
No matching conditions.
On match action
Report vulnerability