'; } else{ echo ''; } echo '
|
|||
Rule General Information |
---|
Release Date: | 2021-12-20 | |
Rule Name: | PHP File Include Vulnerability - require Function | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | The file inclusion vulnerability is caused by a lack of verification of user input in web applications. Successful exploitation can read local files or execute PHP code on remote hosts. This rule is used to detect suspicious PHP file containing function call behavior in HTTP requests, which may lead to file inclusion vulnerability exploitation. | |
Impact: | Attackers include vulnerabilities through PHP files that can read system files or remotely execute PHP code on the host. | |
Affected OS: | Windows, Linux, Others | |
Reference: | ||
Solutions |
---|
1. Filter and escape the user input data to ensure that the input content does not contain malicious file paths. 2. Use the allowlist to limit the file path. 3. try to use safe inclusion functions to avoid repeated inclusion of security problems. |