Path Traversal - NANDITHA90/PortSwigger-LABS GitHub Wiki
LAB - 1
File Path Traversal
-
About
- This lab contains a path traversal vulnerability in the display of product images.
- To solve the lab, retrieve the contents of the
/etc/passwd
file.
(a) Intercept
- Use Burp Suite to intercept and modify a request that fetches a product image.
(b) Modify
-
Modify :
../../../etc/passwd
-
After Modification
SOLVED
LAB - 2
File Path Traversal, traversal sequences blocked with absolute path bypass
-
About
- This lab contains a path traversal vulnerability in the display of product images.
- The application blocks traversal sequences but treats the supplied filename as being relative to a default working directory.
- To solve the lab, retrieve the contents of the
/etc/passwd
file.
(a) Intercept
- Use Burp Suite to intercept and modify a request that fetches a product image.
(b) Modify
-
Modify :
/etc/passwd
-
After Modification
SOLVED
LAB - 3
File Path Traversal, traversal sequences stripped non-recursively
-
About
- This lab contains a path traversal vulnerability in the display of product images.
- The application strips path traversal sequences from the user-supplied filename before using it.
- To solve the lab, retrieve the contents of the
/etc/passwd
file.
(a) Intercept
- Use Burp Suite to intercept and modify a request that fetches a product image.
(b) Modify
-
Modify :
....//....//....//etc/passwd
-
After Modification
SOLVED
LAB - 4
File Path Traversal, traversal sequences stripped with superfluous URL-decode
-
About
- This lab contains a path traversal vulnerability in the display of product images.
- The application blocks input containing path traversal sequences. It then performs a URL-decode of the input before using it.
- To solve the lab, retrieve the contents of the
/etc/passwd
file.
(a) Intercept
- Use Burp Suite to intercept and modify a request that fetches a product image.
(b) Modify
-
Modify :
..%252f..%252f..%252fetc/passwd
-
After Modification
SOLVED
LAB - 5
File Path Traversal, validation of start of path
-
About
- This lab contains a path traversal vulnerability in the display of product images.
- The application transmits the full file path via a request parameter, and validates that the supplied path starts with the expected folder.
- To solve the lab, retrieve the contents of the
/etc/passwd
file.
(a) Intercept
- Use Burp Suite to intercept and modify a request that fetches a product image.
(b) Modify
-
Modify :
/var/www/images/../../../etc/passwd
-
After Modification
SOLVED
LAB - 6
File Path Traversal, validation of file extension with null byte bypass
-
About
- This lab contains a path traversal vulnerability in the display of product images.
- The application validates that the supplied filename ends with the expected file extension.
- To solve the lab, retrieve the contents of the
/etc/passwd
file.
(a) Intercept
- Use Burp Suite to intercept and modify a request that fetches a product image.
(b) Modify
-
Modify :
../../../etc/passwd%00.png
-
After Modification
SOLVED