# Local File Inclusion¶

Local File Inclusion (also known as LFI) allows an attacker to include files in server-side through the web browser. File inclusions are part of every advanced server-side scripting language on the web.LFI is commonly found to affect web applications that rely on a scripting runtime. This occurs mainly due to a bad input validation mechanism, wherein the user’s input is passed to the file include commands without proper validation.

## Impact¶

A successful LFI may result in compromise of the system, data leakage etc. The attacker can read, write, download files and can also run arbitrary codes with privileges of the web server.

### Local file inclusion in PHP:¶

Consider an example as follows where we can apply this attack. http://victim_site/abc.php?file=userinput.txt The value of “file” parameter is taken into the following PHP code, and the file is included:

 1 2 3 4 5 6 7  
An attacker may give malicious input for the "file" parameter which may give unauthorized files in that directory, he can also change the directories by using characters like "../".He can access the user credentials by giving input as "../../../../etc/passwd".In some cases where the file extension is added by default, we can avoid it by adding null byte terminator " %00".Any character after this special character will be ignored.

Suppose that the input given is taken by the following code and the default extension being set is “.php”.

 1 2 3  

by giving file=../../../../etc/passwd%00 we can access the file by passing the ".php" extension.

An attacker can also download files by changing the file names. For example
The attacker may change the broucher.pdf to any other file such as passwords.txt,users.txt etc.

## Explore it yourself¶

Make a PHP file with the code given above and explore different possibilities of the vulnerability.

• ../../../../etc/passwd/etc/issue
• ../../../../etc/passwd
• ../../../../etc/passwd/etc/group
• ../../../../etc/passwd/etc/hosts
• ../../../../etc/passwd/etc/motd
• ../../../../etc/passwd/etc/mysql/my.cnf
• ../../../../proc/self/environ
• ../../../../proc/version
• ../../../../proc/cmdline
• ../../../../proc/sched_debug
• ../../../../proc/mounts
• ../../../../proc/net/arp
• ../../../../proc/net/route
• ../../../../proc/net/tcp
• ../../../../proc/net/udp

# Let's try a challenge¶

NATAS 7 : - USERNAME : natas7 - PASSWORD : 7z3hEENjQtflzgnT29q7wAvMNfZdh0i9

The site is very simple only with two buttons, but once when you click on Home or About the URL changes as follows :

It looks like the PHP file is including the file given as page, when we check the source code we get the hint as
hint: password for webuser natas8 is in /etc/natas_webpass/

So, let's try to include that file in the URL URL : index.php?page=/etc/natas_webpass/natas8 On including this file we get the password for the next level on the screen