← Back to All Scanners
Web VulnerabilitiesHigh Severity

Server-Side Includes (SSI) Scanner

Detects SSI injection vulnerabilities in web servers.

What is Server-Side Includes (SSI)?

Server-Side Include (SSI) injection allows attackers to inject SSI directives that the web server executes. SSI directives can include files, execute commands, print environment variables, and perform other server-side operations, potentially leading to RCE.

Why is This Important?

SSI injection can execute system commands, include sensitive files, print environment variables containing secrets, and fully compromise the server. It's particularly dangerous in legacy applications using SSI.

How It Works

1. Web Crawling

Intelligent crawling discovers all endpoints, forms, parameters, and dynamic content across your web application.

2. Payload Injection

AI-powered payloads test each input vector for web vulnerabilities with context-aware attack patterns.

3. Response Analysis

Advanced analysis detects vulnerability signatures in responses, confirming exploitability with proof-of-concept.

Key Capabilities

Industry-leading web security testing powered by AI, trusted by security teams worldwide for accurate vulnerability detection.

  • Deep web crawling with JavaScript rendering support
  • Context-aware payload generation for each parameter
  • False positive elimination through response analysis
  • OWASP Top 10 and CWE compliance mapping
  • Seamless CI/CD and DevSecOps integration

Frequently Asked Questions

What SSI directives can attackers use?

<!--#exec cmd='command'--> executes commands, <!--#include file='/etc/passwd'--> includes files, <!--#echo var='DOCUMENT_ROOT'--> prints variables.

Which web servers support SSI?

Apache, Nginx (with ngx_http_ssi_module), IIS, and many others. SSI is often enabled for files with .shtml, .shtm, or .stm extensions, or based on configuration.

How do I detect SSI injection?

Inject SSI directives like <!--#echo var='DATE_LOCAL'--> in user inputs. If the server processes them and returns the result, SSI injection is possible.

How do I prevent SSI injection?

Sanitize user input to remove or encode SSI directives, disable SSI if not needed, restrict SSI execution to specific file types, and never allow user input in SSI-processed files.

Related Scanners

Ready to secure your application?

Start testing for server-side includes (ssi) vulnerabilities today.

Get Started Free