PHP Remote File Inclusion
Description
The server is vulnerable to PHP Remote File Inclusion (RFI), which enables attackers to load remote files and have them executed as PHP scripts on the server side. This vulnerability occurs when untrusted user input is directly used in script inclusion without proper validation. Attackers can leverage this vulnerability to include and execute arbitrary remote files, potentially compromising the system’s integrity and confidentiality.
Remediation
Avoid using user-controlled data directly in include
and require
statements and instead consider
an allow-list approach for dynamically including scripts.
If possible, also consider setting allow_url_include=Off
in the server’s PHP configuration to
ensure URLs cannot be used in include
and require
statements.
Details
ID | Aggregated | CWE | Type | Risk |
---|---|---|---|---|
98.1 | false | 98 | Active | high |
Links
Docs
Edit this page to fix an error or add an improvement in a merge request.
Create an issue to suggest an improvement to this page.
Product
Create an issue if there's something you don't like about this feature.
Propose functionality by submitting a feature request.
Feature availability and product trials
View pricing to see all GitLab tiers and features, or to upgrade.
Try GitLab for free with access to all features for 30 days.
Get help
If you didn't find what you were looking for, search the docs.
If you want help with something specific and could use community support, post on the GitLab forum.
For problems setting up or using this feature (depending on your GitLab subscription).
Request support