Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/qeeqbox/local-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve local file
https://github.com/qeeqbox/local-file-inclusion

file include infosecsimplified local qeeqbox vulnerability

Last synced: 2 days ago
JSON representation

A threat actor may cause a vulnerable target to include/retrieve local file

Awesome Lists containing this project

README

        

A threat actor may cause a vulnerable target to include/retrieve local file

## Example #1
1. A threat actor sends a malicious request that includes the local file name to a vulnerable target
2. The vulnerable target includes the malicious local file as PHP and outputs it

## Code
#### Target-Logic
```php

#allow_url_include = On

```

#### Target-In
```
http://vulnerable.test/index.php?file=config.php
```

#### Target-Out
```
db_ip:10.0.0.10
db_name:r&d.db
db_user:root
```

## Impact
High

## Names
- Local file inclusion
- LFI

## Risk
- Read data

## Redemption
- Input validation
- Whitelist

## ID
2690f163-038a-4bc5-9ff3-3a02ba5f84ee

## References
- [Wikipedia](https://en.wikipedia.org/wiki/file_inclusion_vulnerability)