Official discussion thread for Feline. Please do not post any spoilers or big hints.
Yeah, I could use a bit of help on this one, I see the obvious path for the foothold but no idea how to trigger it. Would appreciate some reading material or a nudge
FYI, sample area (upload file) is functioning with chromimum but not from Firefox for me. I’m using Kali Rolling.
Type your comment> @sparkla said:
I see absolutely nothing obvious. There’s u***.j** that’s pretty much happy about anything you feed it, except for a certain type.
I found a l******.t*t file also. Concerning the author of the website code, with a link.
Type your comment> @sparkla said:
@choupit0 said:
I found a l******.t*t file also. Concerning the author of the website code, with a link.
That’s usually just the author of the free html-template.
Yes, nothing interesting.
Does this box require setting up p**tfix or something similar? If so, could one point me to good rescources to securely deploy an S**P server? Thaks
I’m pretty sure to know what is the vuln to exploit. I know uploading a certain filetype leak a lot of informations about where the uploaded file is saved. I can upload my sed ot "son" file. But cant find the good path to make my JS*****D point to it… If someone can give a nudge. Or share some toughts.
Edit: Finally got it! Path is really helpful…
No Idea what it is doing on the backend, like folder structure to get se***d ot file
I am able to upload certain files from the service page (except image files) but I cannot find where the file is uploaded. Can someone give a nudge…
Same as above… no idea where to find/use uploaded files. Nudges please
im tryn to read u*.j*p to see where the files i uploaded go but i get invalid request not sure if im my steps are correct or no
.
@m1r3x how did you find this kinda file, I have already used filter to extract all js files in gobuster. It revealed only u****d.js
Type your comment> @offs3cg33k said:
@m1r3x how did you find this kinda file, I have already used filter to extract all js files in gobuster. It revealed only u****d.js
nvm, I wrote wrong file name by mistake.
⠀
I can see the filepath where it attempts to put the file you upload, just have no idea how to utilize it. Any nudges?
Are we sure that there is any kind of analysis on the uploaded files ?
Rooted, great box
Got user! Very educating user process.