You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The plugin can be easily bypassed with a little trick on the request. I submitted an .exe file that on the interface seems like a .txt file. See de examples:
To explore the problem I made this request:
Any file extension can be used.
The text was updated successfully, but these errors were encountered:
radiusmk
changed the title
Vulnerability - Filter bypass
Vulnerability - Filter can bypassed
May 7, 2021
Thanks, sure, that's why I have underlined in the plugin description that this is not a security plugin. Just something that helps journals limit the file types they are receiving.
Having said that, I am happy to include a pr that will do a more detailed check if you have something ready.
The plugin can be easily bypassed with a little trick on the request. I submitted an .exe file that on the interface seems like a .txt file. See de examples:
To explore the problem I made this request:
Any file extension can be used.
The text was updated successfully, but these errors were encountered: