Remote File Inclusion - RFI
Summary :
A remote file inclusion (RFI) occurs when a file from a remote web server is inserted into a web page. This can be done on purpose to display content from a remote web application. But, it can also happen by accident, due to a misconfiguration of the respective programming language, which can lead to a RFI attack.
Even though this kind of file inclusion can occur in almost every kind of web application, those written in PHP code are more likely to to be vulnerable to Remote File Inclusion attacks, because PHP provides native functions that allow the inclusion of remote files. Other languages usually require a workaround to imitate this behavior.
In my case I got file parameter that was fetching an image from somewhere so I thought that it might be vulnerable to RFI so I went further and checked it and it was vulnerable.
How to find this vulnerability ?
- Go to your target website and find any parameter that loads the content of any remote websites for eg. url, page, file etc. (Use Spider option of burp for finding parameters)
2. Now here we have the file parameter that is fetching an image, lets exploit it
3. While exploiting issue it was giving me an error and was not allowing me to load the contents, so I got an idea of trying it using burp repeater.
4. After trying with burp repeater I was able to exploit it successfully. I loaded the content of some https://www.jp-bank.japanpost.jp/rss/notice.xml website for testing.
5. For confirming I exploited it once again and it was successfully exploited.
Thank You :)
Instagram : jerry._.3