All the actions described in the article were performed with the permission of the site owner as the part of vulnerability tests. In the previous blog post I covered the findings related to temporary file upload, but let’s further and check if we can do something with the final file…