2018
DOI: 10.14419/ijet.v7i2.3.9956
|View full text |Cite
|
Sign up to set email alerts
|

SAISAN: An Automated Local File Inclusion Vulnerability Detection Model

Abstract: Communicating and delivering services to the consumers through web applications are now become very popular due to its user friendly interface, global accessibility, and easy manageability. Careless design and development of web applications are the key reasons for security breaches which are very alarming for the users as well as the web administrators. Currently, Local File Inclusion (LFI) vulnerability is found present commonly in several web applications that lead to remote code execution in host server an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…This framework will give fewer false positive alerts than other applications. An extract of the complete HTTP GET request is shown below: [1] Figure 03: CRLF in the header In this figure, it is a header request where CRLF means the CR and LF tag can be found. CR and LF are special characters (ASCII 13 and 10 respectively, also referred to as \r and \n) that are used to signify the End of Line (EOL).…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…This framework will give fewer false positive alerts than other applications. An extract of the complete HTTP GET request is shown below: [1] Figure 03: CRLF in the header In this figure, it is a header request where CRLF means the CR and LF tag can be found. CR and LF are special characters (ASCII 13 and 10 respectively, also referred to as \r and \n) that are used to signify the End of Line (EOL).…”
Section: Methodsmentioning
confidence: 99%
“…Some of the research has been focused on injection-based attacks including SQL injection, HTML injection, and also code injection. A study on three major SQLi techniques was implemented on the educational and financial websites of Bangladesh and executes analysis web applications for figuring out the security condition [1]. But there was no mention of any CRLF vulnerability.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…However, attacker can delete trusted list file if he/she gets access to the web site directory. On the other hand, Hassan et al [184] proffered a model to detect local file inclusion (LFI) vulnerability. This model is implemented using Python language.…”
Section: • Local File Inclusion(lfi)mentioning
confidence: 99%