<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>File Upload on MrAzoth</title>
    <link>https://az0th.it/web/upload/</link>
    <description>Recent content in File Upload on MrAzoth</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 24 Feb 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://az0th.it/web/upload/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>File Upload Bypass</title>
      <link>https://az0th.it/web/upload/060-upload-file-upload-bypass/</link>
      <pubDate>Tue, 24 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/web/upload/060-upload-file-upload-bypass/</guid>
      <description>&lt;h1 id=&#34;file-upload-bypass&#34;&gt;File Upload Bypass&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: Critical | &lt;strong&gt;CWE&lt;/strong&gt;: CWE-434
&lt;strong&gt;OWASP&lt;/strong&gt;: A03:2021 – Injection / A04:2021 – Insecure Design&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id=&#34;what-is-file-upload-bypass&#34;&gt;What Is File Upload Bypass?&lt;/h2&gt;
&lt;p&gt;File upload vulnerabilities occur when an application accepts user-uploaded files without adequate validation, allowing attackers to upload and execute malicious code or access sensitive files. The attack impact scales from stored XSS to full server compromise depending on execution context.&lt;/p&gt;
&lt;pre tabindex=&#34;0&#34;&gt;&lt;code&gt;Upload Vector → Bypass Filter → Store File → Trigger Execution
     ↑                ↑               ↑              ↑
  multipart        extension      web root,      direct access,
  PUT API          MIME type      readable       LFI include,
  avatar           content sig    path           image proc,
  import           size           predictable    PHAR trigger
&lt;/code&gt;&lt;/pre&gt;&lt;hr&gt;
&lt;h2 id=&#34;discovery-checklist&#34;&gt;Discovery Checklist&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Phase 1 — Enumeration&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>XXE via Binary Formats (DOCX, XLSX, SVG, ODT)</title>
      <link>https://az0th.it/web/upload/062-upload-xxe-binary-formats/</link>
      <pubDate>Tue, 24 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/web/upload/062-upload-xxe-binary-formats/</guid>
      <description>&lt;h1 id=&#34;xxe-via-binary-formats-docx-xlsx-svg-odt&#34;&gt;XXE via Binary Formats (DOCX, XLSX, SVG, ODT)&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: High–Critical | &lt;strong&gt;CWE&lt;/strong&gt;: CWE-611
&lt;strong&gt;OWASP&lt;/strong&gt;: A05:2021 – Security Misconfiguration&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id=&#34;what-is-xxe-via-binary-formats&#34;&gt;What Is XXE via Binary Formats?&lt;/h2&gt;
&lt;p&gt;XML External Entity injection isn&amp;rsquo;t limited to endpoints that explicitly accept XML. Many modern file formats are ZIP archives containing XML files — Office Open XML (DOCX, XLSX, PPTX), OpenDocument (ODT, ODS), EPUB, JAR/WAR — and are processed server-side by import features, preview generators, or document converters. Any of these can trigger XXE if the server-side XML parser has external entities enabled.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Zip Slip / Archive Path Traversal</title>
      <link>https://az0th.it/web/upload/061-upload-zip-slip/</link>
      <pubDate>Tue, 24 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://az0th.it/web/upload/061-upload-zip-slip/</guid>
      <description>&lt;h1 id=&#34;zip-slip--archive-path-traversal&#34;&gt;Zip Slip / Archive Path Traversal&lt;/h1&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: Critical | &lt;strong&gt;CWE&lt;/strong&gt;: CWE-22, CWE-434
&lt;strong&gt;OWASP&lt;/strong&gt;: A04:2021 – Insecure Design&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h2 id=&#34;what-is-zip-slip&#34;&gt;What Is Zip Slip?&lt;/h2&gt;
&lt;p&gt;Zip Slip is a directory traversal vulnerability in archive extraction logic. When an archive contains a file with a path like &lt;code&gt;../../webroot/shell.php&lt;/code&gt;, insecure extraction code writes the file &lt;strong&gt;outside the intended target directory&lt;/strong&gt; — overwriting arbitrary files and enabling RCE via webshell drop.&lt;/p&gt;
&lt;p&gt;Affected archive formats: &lt;strong&gt;ZIP, TAR, GZ, TAR.GZ, BZ2, TGZ, AR, CAB, RPM, 7Z, WAR, EAR, JAR&lt;/strong&gt; (any format that supports subdirectories in file entries).&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
