Sensitive Data: phpwiki 1.5.4 - Cross-Site Scripting/Local File Inclusion¶
Identifier:
phpwiki_lfi
Scanner(s) Support¶
| GraphQL Scanner | REST Scanner | WebApp Scanner | ASM Scanner |
|---|---|---|---|
Description¶
phpwiki 1.5.4 is vulnerable to cross-site scripting and local file inclusion, allowing remote unauthenticated attackers to include and return the content of locally stored files via the index.php endpoint.
How we test: We test for local file inclusion vulnerabilities in phpwiki by injecting file path payloads into the index.php endpoint and analyzing responses to detect if local files can be included and their contents exposed.
Reference:
Configuration¶
Example¶
Example configuration:
Reference¶
skip¶
Type : boolean
Skip the test if true.