diff options
Diffstat (limited to 'doc/user/application_security/dast/checks/98.1.md')
-rw-r--r-- | doc/user/application_security/dast/checks/98.1.md | 34 |
1 files changed, 34 insertions, 0 deletions
diff --git a/doc/user/application_security/dast/checks/98.1.md b/doc/user/application_security/dast/checks/98.1.md new file mode 100644 index 00000000000..b30147f7969 --- /dev/null +++ b/doc/user/application_security/dast/checks/98.1.md @@ -0,0 +1,34 @@ +--- +stage: Secure +group: Dynamic Analysis +info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments +--- + +# PHP Remote File Inclusion + +## Description + +The server is vulnerable to PHP Remote File Inclusion (RFI), which enables attackers to load +remote files and have them executed as PHP scripts on the server side. This vulnerability occurs +when untrusted user input is directly used in script inclusion without proper validation. Attackers +can leverage this vulnerability to include and execute arbitrary remote files, potentially +compromising the system's integrity and confidentiality. + +## Remediation + +Avoid using user-controlled data directly in `include` and `require` statements and instead consider +an allow-list approach for dynamically including scripts. + +If possible, also consider setting `allow_url_include=Off` in the server's PHP configuration to +ensure URLs cannot be used in `include` and `require` statements. + +## Details + +| ID | Aggregated | CWE | Type | Risk | +|:---|:--------|:--------|:--------|:--------| +| 98.1 | false | 98 | Active | high | + +## Links + +- [CWE](https://cwe.mitre.org/data/definitions/98.html) +- [File inclusion Vulnerability - Wikipedia](https://en.wikipedia.org/wiki/File_inclusion_vulnerability) |