Skip to content

Vulnerability - Filter can bypassed #9

@radiusmk

Description

@radiusmk

The plugin can be easily bypassed with a little trick on the request. I submitted an .exe file that on the interface seems like a .txt file. See de examples:

image

To explore the problem I made this request:

image

Any file extension can be used.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions