While I was learning about file upload vulnerability one question come to my mind. What type of file do I use while hunting file upload vulnerability ? Do I need to detect which programming language is used on the backend ? Php extension files are used in most examples.
2 Answers
It's a broad question and hence hard to answer correctly but I will look into it one by one.
What type of file do I use while hunting file upload vulnerability ?
Answer : Try to identify the file parsing in the application. As mentioned the best match is to identify the backend language and upload a file in the same language. PHP extensions are used in most scenarios is a wrong assumption because enterprise core applications are relying on JSP or .Net and uploading a PHP file on these applications might not yield the expected results.
Diving deep : Even though PHP , JSP or ASP files are the extensions that can potentially produce a critical impact on the application server, other file extensions are also dangerous. A few of them are listed below
- Excel and Word can lead to XXE
- Postscripts files like PDF, EPS, PS, XPS
- GIF files leaking memory
- SVG files leading to SSRF, XXE and XSS
- HTML file leading to XSS
This GitHub repo has lots of image related public exploits found so far https://github.com/barrracud4/image-upload-exploits
Final Note : Understanding the file parsing and application behaviour is important to identify the file upload test cases that can be performed on the application. File upload bypass techniques will aid in overcoming certain extension limitations and content-type validation.
More and more threat vectors are revealed in file parsing libraries, so moving forward file upload testing can go beyond expectations.
- 189
- 9
-
Nice answer ! I hope, this will useful for me. – charlie May 18 '22 at 11:58
-
@charlie please check the link and take necessary action https://stackoverflow.com/help/someone-answers – Joel Deleep May 18 '22 at 12:46
When testing for RCE via arbitrary file upload vulnerability, it's essential to be certain about the backend otherwise server won't be able to understand your file.
There are multiple ways to detect the backend language used in the application, most are listed in the response here.
For more general tests, in which you want to see how many types of file extension does the application allows, you can use this extension list in intruder and see how many file extension does the application support and then you can craft an attack from the allowed extension. Like for example, if upload functionality supports SVG extension then you can look for XSS via SVG.
Most of the times file upload restrictions are not applied via extension only, but they can also be done based on the content type and other properties. You can read more about it in here.
- 91
- 3