This is a writeup describing a file upload vulnerability in Image Store V 1.0, where the Content-Type header can be manipulated to bypass restrictions and upload a malicious PHP shell. The exploit involves changing the Content-Type from 'application/octet-stream' to 'image/jpeg' to trick the server into accepting the file.
Classification
Writeup 90%
Target:
Image Store V 1.0
No auth needed
Prerequisites:
access to the target application · ability to intercept/modify HTTP headers