Welcome to WebmasterWorld Guest from

Forum Moderators: coopster & jatar k

Message Too Old, No Replies

Remote File Inclusion Issues

tutorials for newbie

6:08 pm on Mar 22, 2008 (gmt 0)

New User

5+ Year Member

joined:May 19, 2007
posts: 40
votes: 0


I started to learn php and mysql last winter and built two websites with the new gained knowledge.

Now I have problems with remote file inclusions on both websites (both located on different servers).

I read [en.wikipedia.org...] and some of the posts here, yet still don't really know how and where to start with securing my code.

Are there any web tutorials you could point me to where I could learn how to secure my php code agains attackers?

Thank you,

9:59 pm on Mar 22, 2008 (gmt 0)

Junior Member

10+ Year Member

joined:Apr 30, 2006
votes: 0

As long as you have static file includes, or dynamic but selected ones, you shouldn't have a security issue with the include function. All you should take care of is that the users won't be able to change what include files your script includes.

is safe

if ($_GET["a"] == "one")
else if ($_GET["a"] == "two")
is also safe

is not safe, because they can send anything in that textbox1 variable, and include anything they want.

8:56 pm on Mar 23, 2008 (gmt 0)

New User

5+ Year Member

joined:May 19, 2007
posts: 40
votes: 0

In my index.php I have following code that calls all other pages.

<script language="php">
if (!isset($_REQUEST['content']))
$content = $_REQUEST['content'];
$nextpage = $content . ".inc.php";
} </script>

after reading your post, Vis3R, this seems to be the weak part of my websites, because "they can send anything in that 'content' variable"?
Is this correct?

The solution for a beginner would then be to code the pages more static with clearly defined include files?

Thank you!

6:07 pm on Mar 24, 2008 (gmt 0)


WebmasterWorld Administrator coopster is a WebmasterWorld Top Contributor of All Time 10+ Year Member

joined:July 31, 2003
votes: 0

Yes, you are correct. It is user-supplied input and can never be trusted. Always check to be sure the value being passed to you contains what you expect before you use it.

I also note you are using one of the alternative methods for invoking PHP. Although there is really nothing wrong with using that format you may want to reconsider and use the more common format, <?php
Details: Basic syntax [php.net]

1:56 am on Apr 16, 2008 (gmt 0)

New User

5+ Year Member

joined:May 19, 2007
posts: 40
votes: 0

My reply is late, yet I wanted to thank you for the response.

Actually, I started learning php in an online course! With what I know now, I will be more cautious when taking the intermediate class.



Join The Conversation

Moderators and Top Contributors

Hot Threads This Week

Featured Threads

Free SEO Tools

Hire Expert Members