Burp Suite User Forum

Create new post

Add checks for php:// filter

Jonas | Last updated: Sep 15, 2017 06:46PM UTC

Would be really nice if the scanner checks for php:// filter requests. Example request: http://xqi.cc/index.php?m=php://filter/convert.base64-encode/resource=index

Liam, PortSwigger Agent | Last updated: Sep 18, 2017 11:20AM UTC

Have you found an application when Burp Scanner fails to identify this vulnerability? We think that the current payloads (File path manipulation, File path traversal, Out-of-band resource load) used by Burp Scanner will identify applications where this vulnerability exists.

nour.muj | Last updated: Feb 23, 2022 03:04PM UTC

I have found an Web-APP that vulnerable to LFI by using the Warper "php://filter". The current payloads (File path manipulation, File path traversal, Out-of-band resource load) that used by Burp Scanner cann't identify if tested Application was vlunerable to LFI. So as mentioned earlier it would be really good if the scanner would look for diffrent warppers like (php://filter, gopher, zip ..) requests.

Liam, PortSwigger Agent | Last updated: Feb 24, 2022 07:18AM UTC

Thanks for your message, Nour. Is it possible to share the application?

nour.muj | Last updated: Feb 24, 2022 08:25AM UTC

It is an HTB machine named "Timing" with IP "10.10.11.135" on hack the box website.

Liam, PortSwigger Agent | Last updated: Mar 01, 2022 08:08AM UTC

Thanks! We've passed this on to our Research team for consideration.

Liam, PortSwigger Agent | Last updated: Mar 02, 2022 11:35AM UTC

We've added a development ticket to investigate further. Thanks again for your feedback.

You must be an existing, logged-in customer to reply to a thread. Please email us for additional support.