mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
Update README.md
This commit is contained in:
parent
4424650960
commit
b397d462ed
@ -164,7 +164,7 @@ Note that **another option** you may be thinking of to bypass this check is to m
|
||||
|
||||
### Escaping upload directory via NTFS junctions (Windows)
|
||||
|
||||
When uploads are stored under per-user subfolders on Windows (e.g., C:\Windows\Tasks\Uploads\<id>\) and you control creation/deletion of that subfolder, you can replace it with a directory junction pointing to a sensitive location (e.g., the webroot). Subsequent uploads will be written into the target path, enabling code execution if the target interprets server‑side code.
|
||||
(For this attack you will need local access to the Windows machine) When uploads are stored under per-user subfolders on Windows (e.g., C:\Windows\Tasks\Uploads\<id>\) and you control creation/deletion of that subfolder, you can replace it with a directory junction pointing to a sensitive location (e.g., the webroot). Subsequent uploads will be written into the target path, enabling code execution if the target interprets server‑side code.
|
||||
|
||||
Example flow to redirect uploads into XAMPP webroot:
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user