<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Owning_the_box_Via_Web_Application_Flaw</id>
		<title>Owning the box Via Web Application Flaw - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Owning_the_box_Via_Web_Application_Flaw"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Owning_the_box_Via_Web_Application_Flaw&amp;action=history"/>
		<updated>2026-04-04T03:56:13Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Owning_the_box_Via_Web_Application_Flaw&amp;diff=41624&amp;oldid=prev</id>
		<title>D0ubl3 h3lix: New page: '''Description'''  See how an attacker can use our recent discovery of File-Upload vulnerability in Gmail-Lite to 0wn the entire box. This is to teach developers how a flaw in web applicat...</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Owning_the_box_Via_Web_Application_Flaw&amp;diff=41624&amp;oldid=prev"/>
				<updated>2008-09-30T15:33:29Z</updated>
		
		<summary type="html">&lt;p&gt;New page: &amp;#039;&amp;#039;&amp;#039;Description&amp;#039;&amp;#039;&amp;#039;  See how an attacker can use our recent discovery of File-Upload vulnerability in Gmail-Lite to 0wn the entire box. This is to teach developers how a flaw in web applicat...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''Description'''&lt;br /&gt;
&lt;br /&gt;
See how an attacker can use our recent discovery of File-Upload vulnerability in Gmail-Lite to 0wn the entire box. This is to teach developers how a flaw in web application is evil.In this movie, you should learn: 1) Attacker bypasses Firewall by making victim machine connecting back to him via port 80 2) He bypasses WebServer level restrictions on dangerous APIs such as system, exec ...etc by using backtick operator (`) to execute any commands he wants.&lt;br /&gt;
Size: 6.39 MB &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Download:'''&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/0wning_the_box_via_WebAppFlaw.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Updates'''&lt;br /&gt;
&lt;br /&gt;
Thanks to this movie, the patch has been made.&lt;br /&gt;
The php backtick (`) operator has been sent to jail successfully. &lt;br /&gt;
When you work on jailed-php server, you will get &amp;quot;shell exec&amp;quot; disabled message.&lt;br /&gt;
&lt;br /&gt;
[[Category:Non-OWASP_Trainings]]&lt;/div&gt;</summary>
		<author><name>D0ubl3 h3lix</name></author>	</entry>

	</feed>