PHP Local File Inclusion
Attack Pattern ID: 252 (Standard Attack Pattern Completeness: Stub)Typical Severity: MediumStatus: Draft
+ Description


The attacker loads and executes an arbitrary local PHP file on a target machine. The attacker could use this to try to load old versions of PHP files that have known vulnerabilities, to load PHP files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.

+ Attack Prerequisites

The targeted PHP application must have a bug that allows an attacker to control which code file is loaded at some juncture.

+ Resources Required

The attacker needs to have enough access to the target application to control the identity of a locally included PHP file.

+ Related Vulnerabilities
Vulnerability IDRelationship Description

Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.

+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfAttack PatternAttack Pattern190Reverse Engineer an Executable to Expose Assumed Hidden Functionality or Content 
Mechanism of Attack (primary)1000