Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

4
  • 1
    Just to check: you say "last characters of the file is '.jpg'..."; do you mean "last characters of the file name are '.jpg'..."? Commented Jan 27, 2016 at 18:56
  • 1
    Are you sure it checks for .jpg or .jpeg not just jpg or jpeg, or maybe trailing spaces or other characters are allowed? If the latter you can do a double file extension attack. The double extension attack only works if the second extension is not a known mime type. So shell.php.jpeg could work if .jpeg isn't a valid mimetype (it is by default). Otherwise shell.php.jpg123 would also work Commented Jan 28, 2016 at 2:50
  • Or if using old school bugs naming your file something like |ls%20-la.jpg may lead to command injection. Commented Jan 28, 2016 at 2:55
  • symcbean.blogspot.co.uk/2016/06/… Commented Dec 3, 2016 at 23:29