Arbitrary File Write is a critical vulnerability that allows attackers to write or create files at arbitrary locations on the server's filesystem. This typically leads to remote code execution by writing web shells or modifying configuration files.
When an application writes files based on user-controlled paths without proper validation, attackers can write files to sensitive locations, potentially achieving code execution, privilege escalation, or denial of service.
# File upload with path control
POST /upload?path=../../../var/www/html/shell.php
# Log file path manipulation
POST /settings?logfile=../../../var/www/html/backdoor.php
# Configuration export
POST /export?file=../../../.ssh/authorized_keys
# Archive extraction (Zip Slip)
# Malicious archive contains: ../../../var/www/html/shell.php
# Malicious archive entry name:
../../../var/www/html/shell.php
# When extracted without path validation, writes outside
# the intended extraction directory