CAPEC-193: PHP Remote File Inclusion

ID CAPEC-193
Typical Severity High
Likelihood Of Attack High
Status Draft

In this pattern the adversary is able to load and execute arbitrary code remotely available from the application. This is usually accomplished through an insecurely configured PHP runtime environment and an improperly sanitized "include" or "require" call, which the user can then control to point to any web-accessible file. This allows adversaries to hijack the targeted application and force it to execute their own instructions.

https://capec.mitre.org/data/definitions/193.html

Weaknesses

# ID Name Type
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) weakness
CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') weakness
Loading...