Lab #1 Remote code execution via web shell upload

In this video, we cover Lab #1 in the File Upload Vulnerabilities module of the Web Security Academy. This lab contains a vulnerable image upload function. It doesn't perform any validation on the files users upload before storing them on the server's filesystem. To solve the lab, we upload a basic PHP web shell and use it to exfiltrate the contents of the file /home/carlos/secret. We submit this secret using the button provided in the lab banner.

You can log in to your own account using the following credentials: wiener:peter


▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬

Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/file-upload-vulnerabilities/lab-01/notes.txt

Python script: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/file-upload-vulnerabilities/lab-01/file-upload-lab-01.py

PHP web shell: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/file-upload-vulnerabilities/lab-01/test.php

Web Security Academy Exercise Link: https://portswigger.net/web-security/file-upload/lab-file-upload-remote-code-execution-via-web-shell-upload

Rana's Twitter account: https://twitter.com/rana__khalil

Complete and Continue