Korean
<< Back
VID 210158
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description Web server on the host system is vulnerable to RFI(Remote File Inclusion) attack.
Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation.
In PHP the main cause is due to the use of unvalidated external variables such as $_GET, $_POST, $_COOKIE with a filesystem function. Most notable are the include and require statements. The following example shows that an attacker can execute an intended code by inserting remote file path directly to 'COLOR' value.
<?php
if ( isset( $_GET['COLOR'] ) ) {
include( $_GET['COLOR'] . '.php' );
}
?>

* Platforms Affected:
Any HTTP server Any version
Any operating system Any version
Recommendation Take the following steps:
Check whether remote file path is passed in input values.
For instance "http://" should be filtered.
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)