File contains loopholes and use

File Inclusion Vulnerabilities

Many scripting language support files contain, developers typically write the function will re-use of a single file, call this file directly need to use a function, include them in the special features of the code file, and then include code file be interpreted as a set of files to include variables for dynamic invocation, this dynamic calls may cause the client can call the file that contains malicious file caused by loopholes.

Using the file contains a function call, such as include (), require () and the like.

Local file that contains characters to be combined with cross-directory (../), etc.,

Including the use of Apache logs using SSH log auth.log, use SESSION files

Remote File Inclusion

To be continued ...

 

 

Guess you like

Origin www.cnblogs.com/danku/p/12275199.html