(In) Security of File Uploads in Node. js

H Oz, A Acar, A Aris, GS Tuncay, A Kharraz… - Proceedings of the …, 2024 - dl.acm.org
File upload is a critical feature incorporated by a myriad of web applications in an effort to
enable users to share and manage their files conveniently. It has been used in many useful …

Bringing UFUs Back into the Air With FUEL: A Framework for Evaluating the Effectiveness of Unrestricted File Upload Vulnerability Scanners

S Neef, M Oudeh - arXiv preprint arXiv:2405.16619, 2024 - arxiv.org
Unrestricted file upload (UFU) is a class of web security vulnerabilities that can have a
severe impact on web applications if uploaded files are not sufficiently validated or securely …

Security in open source web content management systems

M Meike, J Sametinger, A Wiesauer - IEEE Security & Privacy, 2009 - ieeexplore.ieee.org
Typically, users of Web content management systems lack expert knowledge of the
technology itself, let alone the security issues therein. Complicating the matter, WCMS …

[PDF][PDF] FUSE: Finding File Upload Bugs via Penetration Testing.

T Lee, S Wi, S Lee, S Son - NDSS, 2020 - researchgate.net
An Unrestricted File Upload (UFU) vulnerability is a critical security threat that enables an
adversary to upload her choice of a forged file to a target web server. This bug evolves into …

FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level

P Wichmann, A Groddeck, H Federrath - Proceedings of the 17th …, 2022 - dl.acm.org
Improper handling of file uploads in web applications induces threats to the application and
its users. In this paper, we propose FileUploadChecker, a server-side tool to automatically …

URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing

Y Chen, Y Li, Z Pan, Y Lu, J Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable file upload
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …

A Review of the OW ASP Top 10 Web Application Security Risks and Best Practices for Mitigating These Risks

S Patil, M Rao, L Misal, D Phaldesai… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The security dangers posed by web-based apps are growing along with the number of them.
The OWASP Top 10 Web Application Security Risks, which are the frequently occurring …

Navigating web application security: A survey of vulnerabilities and detection solutions

A Onukrane, HK Skrodelis… - 2023 IEEE 64th …, 2023 - ieeexplore.ieee.org
In an increasingly digital world, web-based applications have become the cornerstone of
business operations and personal activities. However, this widespread use also exposes …

Securing web application code by static analysis and runtime protection

YW Huang, F Yu, C Hang, CH Tsai, DT Lee… - Proceedings of the 13th …, 2004 - dl.acm.org
Security remains a major roadblock to universal acceptance of the Web for many kinds of
transactions, especially since the recent sharp increase in remotely exploitable …

[HTML][HTML] Systematic review of web application security vulnerabilities detection methods

S Rafique, M Humayun, Z Gul, A Abbas… - Journal of Computer and …, 2015 - scirp.org
In recent years, web security has been viewed in the context of securing the web application
layer from attacks by unauthorized users. The vulnerabilities existing in the web application …