Cobalt Crowdsourced Application PentestCobalt Crowdsourced Application PentestCobalt Crowdsourced Application Pentest

Cobalt Vulnerability Wiki


V5 - Validation/Sanitization

Remote Code Execution

POC

Follow these steps while exploiting the vulnerability: - Rename the following php webshell to test.php.jpg - While uploading the file, intercept the request - Keep content type as image/jpg and change file name to test.php - Open the file and execute commands

Note: this is for the Windows environment. There are so many scenarios, this one is specific for Windows environment for PHP shell upload. Please be aware that this is only 1 attack scenario for this vulnerability.

Impact

High

Likelihood

High