Upload vulnerabilities
Last updated
Last updated
Direct server requests with cURL
Eg.
Task 7 of the tryhackme.com practice room (link provided at the top)
The following Javascript file defines the client-side filtering logic, which only allows file uploads of the type image/png
:
Given the following form field in the HTML source code:
A cURL request can be sent directly to the server — completely bypassing the client-side filter.
The -F
or --form
flag in the cURL command can be used to send form-data (given that the file shell.php
is found in the same directory):
The Content-Type header will be automatically added to the final HTTP POST request, and will look like the following:
Interceping and modifying requests with BurpSuite
BurpSuite can be used to modify:
a) The GET response from the server to the client, allowing the removal of JavaScript filter logic loaded on the client side
b) The POST request sent to the server, enabling the removal of client-side filtering before the data is uploaded
a) Presence of valid file extension anywhere within the filename (whitelist bypass)
Some server-side filtering mechanism check if the filename contains a valid file extension without enforcing strict validation at the end of the filenam. This logic can be exploited by including the allowed extension within the filename while using a malicious extension.
A possible server-side logic:
Eg. Given that the valid file extension is .jpg
. A possible valid filename can be: shell.jpg.php
. This allows us to bypass the filter and upload a PHP file — providing us a platform for code execution..
b) Using uncommon file extension for the same file-type (blacklist bypass)
Some server-side filtering logic may check the file extension, and reject the file based on a blacklist. However, blacklist implementations are often incomplete, and fail to cover all possible extensions for the same file-type. This allows us to sneak a filename through the filters, which may be recognized and executed by the server.
Refer to the sub-page named: File extension cheat-sheet.
Eg. Given that .php
is blacklisted, .php5
may still be allowed. Thus, the filename shell.php5
will be accepted by the server, and may execute if configured to handle .php5
files as PHP scripts — providing us a platform for code execution.
Eg.
Task 8 of the tryhackme.com practice room (link provided at the top)
This challenge requires the combination of method 1 and 2 discussed above (**TO CONFIRM).
I decided to create a simple Bash shell script to automate the process of finding the valid filename.
php-ext.txt (wordlist of PHP file extensions)
Bash shell script
Output: FOUND: .php5
The accepted PHP shell script filename is shell.jpg.php5
.
Simple webshell (to transfer to a dedicated WEBSHELL section?)
Magic number refers to the 4 hexadecimal digits present at the start of a file. It is used to identify the type of file, and can be viewed by using the xxd
/hexdump
command (hexeditor
to edit). This logic is implemented by some servers to detect the file-type for filtering purposes — but unfortunately, can be easily workaround.
...