How the attack works
Remote File Inclusion attacks allow malicious users to run their own PHP
code on a vulnerable website. The attacker is allowed to include his
own (malicious) code in the space provided for PHP programs on a web
page. For instance, a piece of vulnerable PHP code would look like this:
include($page . '.php');
This line of PHP code, is then used in URLs like the following example:
http://www.vulnerable.example.org/index.php?page=archive
Because the $page
variable is not specifically defined,
an attacker can insert the location of a malicious file into the URL
and execute it on the target server as in this example:
h
...
Read more »