search
HomeOperation and MaintenanceSafetyExample analysis of web file upload vulnerabilities

File upload function module

The file upload function is a necessary function for most WEB applications. Websites allow users to upload their own avatars, some social networking sites allow users to upload photos, and some services Websites like this require users to upload electronic files of supporting materials, and e-commerce websites allow users to upload pictures to show product conditions, etc. Without adequate security measures, even a seemingly insignificant file upload function can face extremely high security risks.

Example analysis of web file upload vulnerabilities

Principle of File Upload Vulnerability

When a user uploads a file in the file upload function module, if the WEB application There is no effective verification of file security during the upload process. Attackers can attack the server by uploading malicious files such as WEBshell. In this case, it is believed that the system has a file upload vulnerability.

File upload vulnerability---webshell

The most common method of file upload vulnerability is to upload website Trojan horse (webshell) file. WEBSHELL is also called web page Trojan horse file. According to Different development languages ​​are divided into ASP Trojans, PHP Trojans, JSP Trojans, etc. This type of Trojan takes advantage of the system command execution, file reading and writing functions in the script language. Once uploaded to the server and parsed by the script engine, the attacker can Control of the server can be achieved.

Website Trojan (webshell) files are divided into big horses and small horses (one sentence Trojan), picture horses, etc.

Da Ma: The function is relatively good and can be used with the browser; the amount of code is usually Larger; the concealment is relatively weak, the amount of code is large, and features usually need to be hidden through encryption and other methods.

Xiao Ma: The function is simple and needs to be used with the client; the code size is usually small; the concealment is relatively strong, and it is easy to hide features through deformation and bypass filtering. It is usually used together with the cknife tool.

Picture Horse: When a website restricts uploading to image-related formats, attackers cannot bypass the restriction and can try to use Picture Horse to implement webshell operations.

File upload vulnerability bypasses restrictions

In one sentence, the Trojan is similar to . Trojan files are uploaded to the server through the file upload module. The parameter v in $_POST['v'] is the parameter we can use. We pass the instruction we want to execute to the server through parameter v for execution; or use the cknife tool to operate the target server.

(1) The upload format of this webpage is restricted and needs to comply with the following types of formats: jpg, jpeg, JPG, and JPEG, so the original format is changed to 1.jpg format (server-side calibration Verification)

Example analysis of web file upload vulnerabilities

Open the burp suite software to intercept the data packet and change the file name to 1.php so that the php script can be run. Otherwise, although the file with the jpg suffix can Uploaded, but it didn't work.

Example analysis of web file upload vulnerabilities

Example analysis of web file upload vulnerabilities

Define v=phpinfo() in the hackbar plug-in; you can view a large amount of information about the current status of php

Example analysis of web file upload vulnerabilities

(2) This page limits the upload format (MIME). You need to change the file format to JPEG or PNG (server-side verification)

Example analysis of web file upload vulnerabilities

Use burp suite to intercept information and change content-Type to image/png

Example analysis of web file upload vulnerabilities

Use hackbar tool to define parameter v=phoinfo(); view PHP status information

Example analysis of web file upload vulnerabilities

(3) This page filters the file suffix and does not accept PHP type files (server-side verification)

Example analysis of web file upload vulnerabilities

Open the burp suite software to intercept the information, change the file name to 1.PHp, and bypass the identification of the web server

Example analysis of web file upload vulnerabilities

Use hackbar to define v=system (ipconfig);

Example analysis of web file upload vulnerabilities (4) Use truncation to truncate the jpg. This sentence is somewhat confusing. The correct way to write it should be: 1. Use " 2. When using "

Example analysis of web file upload vulnerabilities1.php

The above is the detailed content of Example analysis of web file upload vulnerabilities. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools