Zip Me In: How I Used Archive Bombs and Zip Slip to Write Anywhere
研究人员在参与漏洞赏金计划时发现一家金融科技平台存在重大安全隐患:其JavaScript代码中隐藏着一个未记录的POST端点`/api/v1/admin/tools/import/archive`,允许任何人上传ZIP文件且无任何安全限制或验证机制。 2025-8-6 14:38:24 Author: infosecwriteups.com(查看原文) 阅读量:7 收藏

Iski

Free Link 🎈

Hey there!😁

Zoom image will be displayed

Image By Gemini AI

“They said ZIP it… so I did. And I zipped my way into their system, their logs, their config files, and maybe even their vacation photos.”

Okay let me be honest — when life throws ZIPs at you, make exploits.

So here I am, sipping my sugar-loaded chai, scrolling through a bug bounty program like it’s a Netflix catalog. And boom — I see a file import feature with a wild glint in its eye and no idea of the storm it’s about to face.

While scraping through some recon on a fintech platform, I found a relatively undocumented endpoint buried in the JavaScript files:

POST /api/v1/admin/tools/import/archive

This endpoint accepted multipart/form-data containing ZIP files. No docs, no rate limits, no auth token. Instant red flag, right?

It screamed “internal tool gone public by accident.”

The filename filter? Only *.zip. That's like installing a fancy lock and leaving the door open.


文章来源: https://infosecwriteups.com/zip-me-in-how-i-used-archive-bombs-and-zip-slip-to-write-anywhere-4032dda9c04f?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh