Skip to content

Generic Remote File Inclusion

ID: generic-rfi

Severity: high

Author: m4lwhere

Tags: rfi,dast,oast

id: generic-rfi
info:
name: Generic Remote File Inclusion
author: m4lwhere
severity: high
reference:
- https://www.invicti.com/learn/remote-file-inclusion-rfi/
metadata:
max-request: 1
tags: rfi,dast,oast
http:
- pre-condition:
- type: dsl
dsl:
- 'method == "GET"'
payloads:
rfi:
- "https://rfi.nessus.org/rfi.txt"
fuzzing:
- part: query
mode: single
fuzz:
- "{{rfi}}"
stop-at-first-match: true
matchers:
- type: word
part: body # Confirms the PHP was executed
words:
- "NessusCodeExecTest"
# digest: 4a0a0047304502201defae9e491762c05f2aefe99c8489ba93fd7153248875c686f9c6420abe3dc8022100bec8f77768157cd111d564a3498dfd931718092aa5a06e68b2b0033ef765d537:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "dast/vulnerabilities/rfi/generic-rfi.yaml"

View on Github