Home > CAPEC List > CAPEC-252: PHP Local File Inclusion (Version 2.10)  

CAPEC-252: PHP Local File Inclusion

 
PHP Local File Inclusion
Definition in a New Window Definition in a New Window
Attack Pattern ID: 252
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

The attacker loads and executes an arbitrary local PHP file on a target machine. The attacker could use this to try to load old versions of PHP files that have known vulnerabilities, to load PHP files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.

+ Attack Prerequisites
  • The targeted PHP application must have a bug that allows an attacker to control which code file is loaded at some juncture.

+ Typical Severity

Medium

+ Resources Required

The attacker needs to have enough access to the target application to control the identity of a locally included PHP file.

+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
More information is available — Please select a different filter.
Page Last Updated or Reviewed: May 01, 2017