Remote File Inclusion
Also known as RFI, an attacker can redirect actions to or from another server.
Here we find a typical process for leveraging this vulnerability:
Redirect actions of a server via URL parameters
Sometimes, we will need to check the page code to see the input conditions
We find that the code is blocking the connection through the HTTP protocol
Example source code
In this case, we can try to use another connection protocol
Also if we use hthttp://tp://
the code will do the replacement and leave us anyway with http://
, and we will also bypass this verification
Last updated
Was this helpful?