ABSTRACT

File upload is a common feature in Internet applications. How does it become a loop-hole? Under what conditions does it become a loophole? is chapter will discuss the answers to these questions.

8.1 FILE UPLOAD VULNERABILITY OVERVIEW When there is a le upload vulnerability, users can upload an executable script le to gain privileges to issue commands on the server side. is type of attack is the most direct and eective, and sometimes a little technical skill is required.