02 Lab Web shell upload via path traversal 17efab5460ec801980d1fa9a1e9e0b67
Last updated
Last updated
This lab contains a vulnerable image upload function. It attempts to prevent users from uploading unexpected file types, but relies on checking user-controllable input to verify this.
To solve the lab, upload a basic PHP web shell and use it to exfiltrate the contents of the file
/home/carlos/secret
. Submit this secret using the button provided in the lab banner.You can log in to your own account using the following credentials:
wiener:peter
Creamos un archivo en .php que contenga un exploit de lectura y lo subimos.
Intentamos modificar el parámetro filename al momento de subir el archivo.
Accedemos a la web del usuario y vemos que se carga la “foto” que hemos subido.