From 9754d1ccb89325f761eeef2738b0b1fdb9b48168 Mon Sep 17 00:00:00 2001 From: SirBroccoli Date: Thu, 28 Aug 2025 11:45:38 +0200 Subject: [PATCH] Fix formatting in README.md for file upload section --- src/pentesting-web/file-upload/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/pentesting-web/file-upload/README.md b/src/pentesting-web/file-upload/README.md index f32a28225..ae1a90b75 100644 --- a/src/pentesting-web/file-upload/README.md +++ b/src/pentesting-web/file-upload/README.md @@ -212,7 +212,7 @@ Note that **another option** you may be thinking of to bypass this check is to m ## From File upload to other vulnerabilities -- Set **filename** to `../../../tmp/lol.png` and try to achieve a **path traversal` +- Set **filename** to `../../../tmp/lol.png` and try to achieve a **path traversal** - Set **filename** to `sleep(10)-- -.jpg` and you may be able to achieve a **SQL injection** - Set **filename** to `` to achieve a XSS - Set **filename** to `; sleep 10;` to test some command injection (more [command injections tricks here](../command-injection.md))