file_upload_test
Test web application file upload security by attempting to upload PHP shells using Content-Type bypass techniques and alternative extensions to identify vulnerabilities.
Instructions
Test web shell upload with Content-Type bypass variants. Attempts to upload a PHP web shell using various techniques: 1) Direct .php upload 2) .php with image/jpeg Content-Type (Content-Type bypass) 3) Alternative extensions (.php5, .phtml, .phar, .php7, .phps) 4) Double extension (.php.jpg) 5) Null byte (.php%00.jpg). After each upload, attempts to access the uploaded file to check execution. Returns: {results: [{technique, upload_status, execution_status, output, successful}]}. Side effects: Uploads files to the server. May achieve remote code execution.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | Base URL of the target application, e.g. https://target.com | |
| upload_endpoint | Yes | Upload endpoint path, e.g. /my-account/avatar or /api/upload | |
| upload_field | No | Form field name for the file upload, e.g. 'avatar', 'file', 'upload' | file |
| upload_path_prefix | No | Path where uploaded files are accessible, e.g. /files/avatars/ | /files/avatars/ |
| auth_cookie | No | Session cookie for authenticated uploads | |
| shell_command | No | Command the PHP shell should execute | id |
| extra_fields | No | Additional form fields, e.g. 'user=test&csrf=abc123' |