Soumettre #780419: SourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusioninformation

TitreSourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusion
DescriptionA Local File Inclusion (LFI) vulnerability was discovered in the Leave Application System in PHP and SQLite3 developed by oretnom23. The vulnerability exists because the application loads pages dynamically using a user-controlled parameter without proper validation. The vulnerable code is: $page = $_GET['page'] ?? 'home'; include($page.".php"); An attacker can manipulate the "page" parameter to include unintended files. Using the PHP filter wrapper, attackers can read sensitive source code files. Example payload: ?page=php://filter/convert.base64-encode/resource=index This payload returns the Base64 encoded source code of the file. The encoded data can be decoded using: echo "BASE64CODE" | base64 -d This reveals sensitive server-side source code including database connection files and authentication logic. An attacker may use this information to further compromise the application.
La source⚠️ https://medium.com/@hemantrajbhati5555/local-file-inclusion-lfi-in-leave-application-system-php-sqlite3-4e095bb7ee40
Utilisateur Hemant Raj Bhati (UID 95613)
Soumission15/03/2026 12:18 (il y a 23 jours)
Modérer31/03/2026 12:18 (16 days later)
StatutAccepté
Entrée VulDB354346 [SourceCodester Leave Application System 1.0 page élévation de privilèges]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!