Skip to content

jamarir/RaceUploadExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Race Upload Exploit

Definition

Some developers implement their own file upload processes. Basically, the file is uploaded, and then checked for validation by the server.

Similarly to antiviruses, the malicious uploaded files that could not be validated are deleted in milliseconds. During that short period of time, an attacker (knowing the uploads location) may have access to the file.

Thus, he could brute force the URL of the uploaded file.

Usage

$ python3 ./upload_racer.py -h
$ python3 ./upload_racer.py --url "<URL>" --exclude "<NOT_FOUND_SAMPLE>"

Reference: https://portswigger.net/web-security/file-upload

About

# Race Upload Exploit

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages