allow_url_fopen Enabled

Description

This vulnerability was detected using the information from phpinfo() page.
When the “allow_url_fopen” option is enabled, it is possible to retrieve data from remote places such as servers for uploading files (FTP) or websites.
If we add it to poor input filtering, it might lead to possible code injection vulnerabilities.

Based on the application, it is possible that we will be exposed to remote file inclusion vulnerabilities, this may have several different consequences, some examples are :

  • Injection of malicious malwares.
  • Information exposure by granting excessive privileges or permissions to the untrusted sources or functions.
  • Stealing user’s saved session data (Cookies).

Recommendation

Disable the “allow_url_fopen” option, from php.ini or .htaccess :

  • For php.ini : allow_url_fopen = ‘off’
  • For .htaccess : php_flag allow_url_fopen off

References

https://www.php.net/manual/en/filesystem.configuration.php

https://cwe.mitre.org/data/definitions/829.html

< Return to all Vulnerabilities

Bug Bounties

As pirates, we all love plundering, we all love raiding, but mostly, we all love bounties, especially Bug Bounties. Let’s talk about it. Bug Bounties

Read More »

APT vs. ATP

In this article we will talk about APT vs. ATP. In other words, Advanced Persistent Threat and Advanced Threat Protection and the context between these

Read More »

Active Directory Hacking

What does Active Directory mean? The Active Directory infrastructure is a critical infrastructure in most organizations, and it forms the backbone of the organization’s computing

Read More »