Description
This script is vulnerable to file inclusion attacks.
The script was found to reference and potentially retrieve files from user-specified locations. User input is not sufficiently validated or sanitized prior to being passed to the vulnerable script's include function.
Remediation
Edit the source code to ensure that input is properly validated. Where is possible, it is recommended to make a list of accepted filenames and restrict the input to that list.
For PHP, the option allow_url_fopen would normally allow a programmer to open, include or otherwise use a remote file using a URL rather than a local file path. It is recommended to disable this option from php.ini.
References
Related Vulnerabilities
Python Improper Input Validation Vulnerability (CVE-2013-4238)
RubyGems Improper Input Validation Vulnerability (CVE-2015-4020)
SugarCRM Improper Input Validation Vulnerability (CVE-2017-14509)
WordPress Plugin Export Users to CSV CSV Injection (1.1.1)
WordPress Plugin PictPress 'resize.php' Multiple Local File Include Vulnerabilities (1.0)