Skip to content

Bypass

  • Change the HTTP Verb.
  • you can check the allowed http methods using OPTION
  • Then, can try one of the methods to check if it responds differently.
  • This is due to Insecure COnfig
    IMPORTANT
  • Change POST request to a GET request with those parameters

Bypass Filters

  • give input and press 'Enter'
  • check that the file is created
  • give input for command injection - test;
    • notice that the app responds with malicious request detected.
  • It can be that the security filter is only applied for a specific http method.
  • changing the http method, the app fulfills the request.
  • Now, we can do command injection by changing the GET request to a POST request.
  • This is due to Insecure Coding

Prevention

  • most modern web servers, including ApacheTomcat, and ASP.NET have this.

Insecure Config

  • the Apache's site configuration file is present in (e.g. 000-default.conf), or in a .htaccess web page configuration file
  • For Tomcat:
  • For ASP.NET