-
Notifications
You must be signed in to change notification settings - Fork 104
I Found The Security Issue #69
Comments
PoC ITDB - Unrestricted File Upload.pdf
I. Application Background: II. Vulnerability Description: III. Exploit: Directory Listing at “http://target.com/itdb-directory/data/files/“ Check your shell on field “Filename” and access your shell like this: script for shellcmd.php
====== IV. Remediation: Content-type Verification: This kind of verification completely depends upon content-type header, e.g. Content-Type: image/jpeg, containing the MIME type. This is a very weak validation mechanism, as this header is supplied by the user or attacker. (source: https://blog.qualys.com/securitylabs/2015/10/22/unrestricted-file-upload-vulnerability) V. Proof of Concept: |
Hey Sivann,
I found the security issue / vulnerability on ITDB application. I have sent Proof of Concept to your email "[email protected]".
is it possible if I post the vulnerability in here?
The text was updated successfully, but these errors were encountered: