MIME type bypass:
When uploading the Trojan, the prompt format is wrong. Direct Grab package Modify Content-type to try bypassing for the correct format
File name extension Bypass:
PHP can parse the PHP2.PHP3,PHP4 suffix in addition to the PHP suffix
File Content Detection Bypass:
Grab the bag and add a word to the end of the normal picture Trojan
00 truncation Bypass Upload
1.php. jpg Space binary 20 change to 00
IIS 6.0 directory path detection parsing bypass
Upload path changed to
xxx/1.asp/
IIS6.0 parsing Defect Vulnerability Bypass
Upload path out modification
xxx/1.php;
Apache parsing bug Bypass upload vulnerability
Modify suffix Name
122.php.7zz (7zz unrecognized suffix name)
htaccess Parsing Vulnerability:
Uploaded jpg files will be parsed in PHP format.
. htaccess content:
AddType application/x-httpd-php. jpg
FCK Editor version recognition and information collection
Version address (2.2.4/2.2.6)
_samples/default.html
_whatsnew.html
Fck2.2.4 Upload Address:
Editor/filemanager/browser/default/comectors/test.html
Editor/filemanager/upload/test.html
V2.2.6
Editor/filemanager/connectors/test.html
...../uploadtest.html. ............ ...........---------
FCK Editor Parsing vulnerability
Create folder under/1.asp/2.asp (2.asp will be turned into 2_asp)
Defense methods:
Some summary of File Upload vulnerability