webProhard
Revenge Upload
hackerlab
Task: achieve RCE on a file upload service without source code. Solution: exploit a race condition by uploading a PHP webshell with double extension (.png.php) and requesting it before the server deletes it.
$ ls tags/ techniques/
race_condition_uploaddouble_extension_bypassphp_webshell
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Easy Upload— hackerlab
- [web][Pro]Lab 307 — CrewHub — File Upload RCE via Polyglot JPG/PHP— hackadvisor
- [web][Pro]Файлообменник (File Exchange)— hackerlab
- [web][Pro]Lab 165 — ReplyStream — File Upload Bypass via Content-Type Validation— hackadvisor
- [web][Pro]Звездный сейф (Star Safe)— hackerlab