From 6394757dc3df8639542432314a67963eddca253c Mon Sep 17 00:00:00 2001 From: "Fabian S. Varon Valencia" Date: Wed, 26 Oct 2022 20:38:01 -0500 Subject: [PATCH] added a new reference to code injection --- Upload Insecure Files/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/Upload Insecure Files/README.md b/Upload Insecure Files/README.md index f86bd32..6ee8adc 100644 --- a/Upload Insecure Files/README.md +++ b/Upload Insecure Files/README.md @@ -210,3 +210,4 @@ Upload the XML file to `$JETTY_BASE/webapps/` * [Injection points in popular image formats - Daniel Kalinowski‌‌ - Nov 8, 2019](https://blog.isec.pl/injection-points-in-popular-image-formats/) * [A tip for getting RCE in Jetty apps with just one XML file! - Aug 4, 2022 - PT SWARM / @ptswarm](https://twitter.com/ptswarm/status/1555184661751648256/) * [Jetty Features for Hacking Web Apps - September 15, 2022 - Mikhail Klyuchnikov](https://swarm.ptsecurity.com/jetty-features-for-hacking-web-apps/) +* [Inyección de código en imágenes subidas y tratadas con PHP-GD - Spanish Resource - hackplayers](https://www.hackplayers.com/2020/03/inyeccion-de-codigo-en-imagenes-php-gd.html)