kawalkarhemant / webgoat

Automatically exported from code.google.com/p/webgoat
0 stars 0 forks source link

New Lesson Request: Malicious File Execution Stage 2 #38

Open GoogleCodeExporter opened 9 years ago

GoogleCodeExporter commented 9 years ago

Upon finishing Malicious File Execution, there can be stage 2 which  allows
file uploading only with valid extension like jpg, jpeg, png, gif and the
like. Students can be asked bypass it via null-byte character to pass Stage 2. 

Original issue reported on code.google.com by yehg.net on 3 May 2010 at 4:24

GoogleCodeExporter commented 9 years ago

Original comment by mayhe...@gmail.com on 24 Apr 2012 at 4:30