Live webinar | March 27th: Learn the future of AppSec as we launch our vision for Burp Suite in 2025.            Register Now

Lab: File path traversal, traversal sequences stripped non-recursively

PRACTITIONER

This lab contains a path traversal vulnerability in the display of product images.

The application strips path traversal sequences from the user-supplied filename before using it.

To solve the lab, retrieve the contents of the /etc/passwd file.

Solution

  1. Use Burp Suite to intercept and modify a request that fetches a product image.
  2. Modify the filename parameter, giving it the value:

    ....//....//....//etc/passwd
  3. Observe that the response contains the contents of the /etc/passwd file.

Community solutions

Rana Khalil
Intigriti
z3nsh3ll
Michael Sommer