The files uploaded to the server present a huge risk. Thus arises the need to check the files uploaded to the server. Almost every intrution attack starts with a milicious file upload to the server. There are many server where the PHP file upload is turned on. This leads to unrestricted files to upload to the server. This vulnerability may cause attacks like denial of service, code injection.
Impact
The impact include:-
- Denial of service attack
- Code injection
- Server-side attacks
- Client-side attacks
Mitigation / Precaution
This vulnerability can be fixed by:-
- Restricting file types accepted for upload.
- Checking the file extension.
- Using the whitelist approach.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.