제출 #780419: SourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusion정보

제목SourceCodester Leave Application System in PHP and SQLite3 1.0 Local File Inclusion
설명A Local File Inclusion (LFI) vulnerability was discovered in the Leave Application System in PHP and SQLite3 developed by oretnom23. The vulnerability exists because the application loads pages dynamically using a user-controlled parameter without proper validation. The vulnerable code is: $page = $_GET['page'] ?? 'home'; include($page.".php"); An attacker can manipulate the "page" parameter to include unintended files. Using the PHP filter wrapper, attackers can read sensitive source code files. Example payload: ?page=php://filter/convert.base64-encode/resource=index This payload returns the Base64 encoded source code of the file. The encoded data can be decoded using: echo "BASE64CODE" | base64 -d This reveals sensitive server-side source code including database connection files and authentication logic. An attacker may use this information to further compromise the application.
원천⚠️ https://medium.com/@hemantrajbhati5555/local-file-inclusion-lfi-in-leave-application-system-php-sqlite3-4e095bb7ee40
사용자 Hemant Raj Bhati (UID 95613)
제출2026. 03. 15. PM 12:18 (22 날 ago)
모더레이션2026. 03. 31. PM 12:18 (16 days later)
상태수락
VulDB 항목354346 [SourceCodester Leave Application System 1.0 page 권한 상승]
포인트들20

Might our Artificial Intelligence support you?

Check our Alexa App!