Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Xerox DC260 EFI Fiery Controller Webtools 2.0 - Local File Inclusion

By kannthu

High
Vidoc logoVidoc Module
#iot#xerox#disclosure#lfi#packetstorm
Description

What is the "Xerox DC260 EFI Fiery Controller Webtools 2.0 - Local File Inclusion?"

The "Xerox DC260 EFI Fiery Controller Webtools 2.0 - Local File Inclusion" module is designed to detect a vulnerability in the Xerox DC260 EFI Fiery Controller Webtools 2.0 software. This vulnerability is classified as CWE-22 and has a severity level of high. The module was authored by gy741.

Impact

A local file inclusion vulnerability allows an attacker to include arbitrary files from the target system. In the case of the Xerox DC260 EFI Fiery Controller Webtools 2.0, this vulnerability can be exploited to read sensitive files, such as the "/etc/passwd" file, which contains user account information.

How the module works?

The module sends an HTTP GET request to the "/wt3/forceSave.php" script with the "file" parameter set to "/etc/passwd". It then applies two matching conditions to determine if the vulnerability is present:

    - The response body is checked using a regular expression to ensure that the "root" user entry is present in the "/etc/passwd" file. - The response status code is checked to ensure it is 200, indicating a successful request.

If both conditions are met, the module reports the vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/wt3/forceSave.php?f...
Matching conditions
regex: root:.*:0:0:and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability