This is a writeup describing an image file upload vulnerability that allows shell upload. It provides a URL path to exploit but lacks actual exploit code or technical details.
Classification
Writeup 90%
Attack Type
Other
Complexity
Trivial
Reliability
Theoretical
Target:Image file upload by Bloody (version not specified)
No auth needed
Prerequisites:access to the vulnerable upload endpoint