'; } else{ echo ''; } echo '
|
|
|||
Release Date:2025/9/15
Rule Name:PHP Inclusion Command Sequence, such as 'mosConfig_absolute_path'
Severity:high
CVE ID:
| Descripiton:
|
File inclusion vulnerability is a type of vulnerability that is most commonly found to affect Web application that relies on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. Remote File Inclusion (RFI) occurs when the Web application downloads and executes a remote file. These remote files are usually obtained in the form of a HTTP or FTP URI as a user-supplied parameter to the Web application. This rule inspects PHP commands included in HTTP request to prevert RFI attack attempts. This rule supports to defend the A1: Broken Access Control of OWASP Top 10 - 2021.
Other reference:None
| Solution:
|
Update vendor patches.