Blog from Cherry Blossom
It is indeed a clever way to upload truncated characters! It must be a strange person to come up with this trick!
In fact, this is also very simple! It is theoretically stopped when the upload is half done!
For example, if an upfile. asp file is found, but the file extension is incorrect during upload!
You can use this trick to upload a 1.asp.jpg file. I don't know if you want to understand it!
Haha! I guess you have come up with the principle! Upload can be truncated when 1.asp.jpg is uploaded.
The extension of the content uploaded in the process result is 1.asp webshell.
You can also upload 1.asp. The prompt is definitely not successful!
Then modify the uploaded data packet to the following nc submission. Note that if you upload data packets, add a space at the end of 1.asp.
So win2000 does not show its outstanding efficacy in dealing with this vulnerability!
It is recognized as 1.asp and saved in the wwwroot directory! Form your webshell
This vulnerability originated from the fact that all programmers Compare file extensions with functions! This error is caused.