'; } else{ echo ''; } echo '
|
|||
Release Date:2025/9/15
Rule Name:php data preudo protocol file inclusion
Severity:high
CVE ID:
Descripiton:
|
File inclusion vulnerability is a type of vulnerability that is most commonly found to affect Web application that relies on a scripting run time. This issue is caused when an application builds a path to executable code using an attacker-controlled variable in a way that allows the attacker to control which file is executed at run time. Remote File Inclusion (RFI) occurs when the Web application downloads and executes a remote file. These remote files are usually obtained in the form of a HTTP or FTP URI as a user-supplied parameter to the Web application. This rule inspects data preudo protocol included in HTTP request args to prevert RFI attack attempts. This rule supports to defend the A3: Injection of OWASP Top 10 - 2021.
Other reference:None
Solution:
|
Update vendor patches.