PHP Local File Inclusion |
Attack Pattern ID: 252 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
PHP Local File Inclusion |
Attack Pattern ID: 252 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Summary
The attacker loads and executes an arbitrary local PHP file on a target machine. The attacker could use this to try to load old versions of PHP files that have known vulnerabilities, to load PHP files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.
The targeted PHP application must have a bug that allows an attacker to control which code file is loaded at some juncture.
The attacker needs to have enough access to the target application to control the identity of a locally included PHP file.
Vulnerability ID | Relationship Description |
---|---|
CVE-2009-0932 | Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name. |
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 190 | Reverse Engineer an Executable to Expose Assumed Hidden Functionality or Content | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.