提出 #780419: SourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusion情報

タイトルSourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusion
説明A Local File Inclusion (LFI) vulnerability was discovered in the Leave Application System in PHP and SQLite3 developed by oretnom23. The vulnerability exists because the application loads pages dynamically using a user-controlled parameter without proper validation. The vulnerable code is: $page = $_GET['page'] ?? 'home'; include($page.".php"); An attacker can manipulate the "page" parameter to include unintended files. Using the PHP filter wrapper, attackers can read sensitive source code files. Example payload: ?page=php://filter/convert.base64-encode/resource=index This payload returns the Base64 encoded source code of the file. The encoded data can be decoded using: echo "BASE64CODE" | base64 -d This reveals sensitive server-side source code including database connection files and authentication logic. An attacker may use this information to further compromise the application.
ソース⚠️ https://medium.com/@hemantrajbhati5555/local-file-inclusion-lfi-in-leave-application-system-php-sqlite3-4e095bb7ee40
ユーザー Hemant Raj Bhati (UID 95613)
送信2026年03月15日 12:18 (22 日 ago)
モデレーション2026年03月31日 12:18 (16 days later)
ステータス承諾済み
VulDBエントリ354346 [SourceCodester Leave Application System 1.0 page 特権昇格]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!