HACK STEPS (continued)
On Unix-based platforms, files that root may not write are version-
dependent, but attempting to overwrite a directory with a file should
always fail, so you can try:
../../../../../../../../../../../../tmp/writetest.txt
../../../../../../../../../../../../tmp
For each pair of tests, if the application’s behavior is different in response
to the first and second requests (for example, if the second returns an error
message, while the first does not), then it is likely that the application is
vulnerable.
■
Do'stlaringiz bilan baham: