Test For Checking File Uploads

OWASP 2013-A1 OWASP 2017-A1 CAPEC-17 CWE-434 WASC-13

The files uploaded to the server present a huge risk. Thus arises the need to check the files uploaded to the server. Almost every intrution attack starts with a milicious file upload to the server. There are many server where the PHP file upload is turned on. This leads to unrestricted files to upload to the server. This vulnerability may cause attacks like denial of service, code injection.

Impact

The impact include:-

  • Denial of service attack
  • Code injection
  • Server-side attacks
  • Client-side attacks

Mitigation / Precaution

This vulnerability can be fixed by:-

  • Restricting file types accepted for upload.
  • Checking the file extension.
  • Using the whitelist approach.

Latest Articles