Practitioner Lab 3: File path traversal, traversal sequences stripped with superfluous URL-decode

 This lab contains a path traversal vulnerability in the display of product images.

The application blocks input containing path traversal sequences. It then performs a URL-decode of the input before using it.

To solve the lab, retrieve the contents of the /etc/passwd file.



I started by looking around the page to see how it worked.

I then opened one of the images to see the request.



I looked at the request and then I changed it



I had to encode it for it to work.

and the lab is solved.



Comments

Popular posts from this blog

Vulnerability Management(Nessus)

Active Directory Home Lab

Practitioner Lab 2: File path traversal, traversal sequences stripped non-recursively

TightVNC and Colasoft Packet Builder Lab