File inclusion vulnerabilities occur when developers use request parameters, which can be modified by users, to dynamically choose which pages to load or to include in the code the server will execute. Such vulnerabilities may cause a full system compromise if the server executes the included file.
In this recipe, we will test a web application to discover whether it is vulnerable to file inclusions.