123 – Local file inclusion
Description
The application allows to read or execute files located on the server through relative paths manipulation in the input fields.
Impact
- Visualize the content of sensitive files stored on the server. - Get sensitive data. - Read system files.
Recommendation
- Validate that the parameters received by the application do not contain relative paths. - Disable insecure functions that allow reading of arbitrary files on the server.
Threat
Unauthorized attacker from local network.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: L
- Attack Requirements: N
- Privileges required: N
- User interaction: N
- Confidentiality (VC): H
- Integrity (VI): N
- Availability (VA): N
- Confidentiality (SC): L
- Integrity (SI): L
- Availability (SA): L
Threat 4.0
- Exploit maturity: A