Skip to main content

How to Approach Web Application Vulnerability Assessment using Burp Community | Part - 3 | Audit Guidelines | High Impact Web Vulnerability | RCE

Web application file upload RCE are very common and multiple bypasses for the existing mitigations are available. In this part-3 of blog series of how to check the web application vulnerability with Burp Community Edition, I will cover one of the bypass technique. This blog will be very helpful while performing the web application security assessment( VAPT) manually. In this part of the blog, we will cover a file upload vulnerability with High impact severity. Please refer the audit guidelines below


Audit Guideline

Concept- Linux has a file name restriction of 255 characters/bytes. If you attempt to create a file that has more than 255 characters in its name, then it will truncate the characters after that 255 characters. So now we have to upload a file named like this:

fffffffffff......fffffffffff.php.jpeg


where the length of green highlighted part is exactly 255. Uploading this would bypass the extension restriction at the client and server end, but when storing the file at server, that .jpeg will get removed from file name, leaving behind a .php shell file uploaded successfully.




[Disclaimer - For Education Purpose - Case study, attacks' scenarios and audit guidelines on vulnerabilities]

Popular posts from this blog

Essential System Design Concepts for Application Security Professionals

Introduction System design concepts is paramount for safeguarding digital assets against ever-evolving threats. Understanding how to architect systems that are not only robust and scalable but also inherently secure is essential. By grasping core system design concepts tailored to the unique demands of security, these concepts can fortify their applications against potential vulnerabilities and protect sensitive data from malicious actors.   In this blog post, we will discuss 20 latest interview questions related to system design in application security. 1. Explain the concept of threat modeling. Threat modeling is a process used to identify and prioritize potential threats to a system. It involves analyzing the system's architecture, identifying potential vulnerabilities, and evaluating the impact of different threats. The goal of threat modeling is to proactively design security measures that mitigate these threats. 2. How would you design a secure authentication system? A s...