Submit #780419: SourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusioninfo

TitelSourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusion
BeschreibungA Local File Inclusion (LFI) vulnerability was discovered in the Leave Application System in PHP and SQLite3 developed by oretnom23. The vulnerability exists because the application loads pages dynamically using a user-controlled parameter without proper validation. The vulnerable code is: $page = $_GET['page'] ?? 'home'; include($page.".php"); An attacker can manipulate the "page" parameter to include unintended files. Using the PHP filter wrapper, attackers can read sensitive source code files. Example payload: ?page=php://filter/convert.base64-encode/resource=index This payload returns the Base64 encoded source code of the file. The encoded data can be decoded using: echo "BASE64CODE" | base64 -d This reveals sensitive server-side source code including database connection files and authentication logic. An attacker may use this information to further compromise the application.
Quelle⚠️ https://medium.com/@hemantrajbhati5555/local-file-inclusion-lfi-in-leave-application-system-php-sqlite3-4e095bb7ee40
Benutzer Hemant Raj Bhati (UID 95613)
Einreichung15.03.2026 12:18 (vor 19 Tagen)
Moderieren31.03.2026 12:18 (16 days later)
StatusAkzeptiert
VulDB Eintrag354346 [SourceCodester Leave Application System 1.0 page erweiterte Rechte]
Punkte20

Do you know our Splunk app?

Download it now for free!