Elevating Local File Inclusions To Remote Code Execution
Tags
attack-pattern: | Data Direct Server - T1583.004 Server - T1584.004 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | b974b149-99af-46f4-9b85-aa27d505684f |
Fingerprint | 1512bc836eb30585 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Nov. 3, 2024, 4:29 p.m. |
Added to db | Nov. 3, 2024, 5:30 p.m. |
Last updated | Nov. 17, 2024, 5:56 p.m. |
Headline | Elevating Local File Inclusions To Remote Code Execution |
Title | Elevating Local File Inclusions To Remote Code Execution |
Detected Hints/Tags/Attributes | 25/1/13 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 831 | example.com |
|
Details | Domain | 70 | evil.com |
|
Details | File | 91 | access.log |
|
Details | File | 1204 | index.php |
|
Details | File | 2 | evil.jpg |
|
Details | File | 1 | tempfile123.php |
|
Details | File | 10 | shell.txt |
|
Details | Url | 1 | http://example.com/index.php?page=../../../../var/log/apache2/access.log |
|
Details | Url | 2 | http://example.com/index.php?page= |
|
Details | Url | 1 | http://example.com/index.php?page=../../../../uploads/evil.jpg |
|
Details | Url | 1 | http://example.com/index.php?page=../../../../tmp/tempfile123.php |
|
Details | Url | 1 | http://example.com/index.php?page=php://filter/convert.base64-encode/resource=index.php |
|
Details | Url | 1 | http://example.com/index.php?page=http://evil.com/shell.txt |