Remote File Inclusion

Impact: High


Remote File Inclusion (RFI) is a vulnerability that allows attackers to include remote files, exploiting dynamic file inclusion mechanisms in the target application. This occurs due to the use of user-supplied input without proper validation. Attackers can execute arbitrary code on the server, leading to Server-Side Request Forgery (SSRF) issues.


To mitigate RFI vulnerabilities, avoid passing user-submitted input to filesystem/framework APIs. If unavoidable, maintain an allow list of files that may be included, using an identifier to access selected files. Reject any request with an invalid identifier to eliminate attack surface.


Last updated on May 13, 2024

This issue is available in SmartScanner Professional

See Pricing