Traversing the Path to RCE

This post will detail the steps I took to find a path traversal vulnerability, and how I paired the vulnerability with the logic of the application to achieve Remote Code Execution through a shell upload. I found this while testing a mobile application that has a feature allowing users to upload and encrypt documents to […]

Read More Traversing the Path to RCE