'; } else{ echo ''; } echo '
|
|
|||
Release Date:2025/9/15
Rule Name:Remote File Inclusion Attack
Severity:critical
CVE ID:
| Descripiton:
|
File inclusion vulnerability is a type of vulnerability that is most commonly found to affect Web application that relies on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. Remote File Inclusion (RFI) occurs when the Web application downloads and executes a remote file. These remote files are usually obtained in the form of a HTTP or FTP URI as a user-supplied parameter to the Web application. This rule inspects off-domian references included in HTTP request to prevert RFI attack attempts. This rule supports to defend the A1: Broken Access Control of OWASP Top 10 - 2021.
Other reference:None
| Solution:
|
Update vendor patches.