sqli_file_read
Read server files through SQL injection using UNION SELECT LOAD_FILE(). Requires MySQL FILE privilege to access server-side files like /etc/passwd for security testing.
Instructions
Read server files via UNION SELECT LOAD_FILE(). Requires MySQL FILE privilege. Uses LOAD_FILE() in a UNION SELECT. Returns file_content, success, target_file. Errors: FILE privilege required. Returns empty if privilege denied.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Full URL with injectable parameter | |
| parameter | Yes | Vulnerable parameter name | |
| target_file | No | Server-side file to read, e.g. /etc/passwd | |
| column_count | No | Number of columns (from previous UNION discovery) | |
| string_column | No | 1-indexed column that displays strings |