Rebuild Database | Login
  • Getting Started with WebGoat.NET
    • Welcome
    • Web Proxy Test
    • Testing Database
  • WebGoat Coins Customer Portal
    • Customer Login
    • Forgot Password
    • Change Password
    • Customer Portal
    • Product Catalog
    • Product Details
    • Customer Orders
    • Logout
  • Injection Attacks
    • SQL Error Messages
    • Exploiting SQL Injection
    • File Download Path Manipulation
    • File Upload Path Manipulation
  • Cross Site Scripting (XSS)
    • Stored XSS
    • Reflected XSS
  • Authentication Issues
    • Insecure Forgot Password
  • Testing and Debugging
    • Exploiting Debug Page
  • Encryption
    • Encryption vs Encoding
    • Insecure Message Digest
    • Weak Random Number Generators
  • .NET Exploits
    • Unsafe blocks
Skip Navigation LinksOWASP.WebGoat.NET Injection Attacks File Upload Path Manipulation

Lesson Instructions

This lesson illustrates the common problem of trusting a user-supplied filename, then using it to generate a file path. Try uploading a file that will execute on the server.

File Upload

Select the file you want to upload, then click the Upload Document button

Attach a file (PDF, Excel or Plain Text)...