Lab: File path traversal, traversal sequences stripped with superfluous URL-decode
This lab contains a file path traversal vulnerability in the display of product images.
The application blocks input containing path traversal sequences. It then performs a URL-decode of the input before using it.
To solve the lab, retrieve the contents of the
- Use Burp Suite to intercept and modify a request that fetches a product image.
filenameparameter, giving it the value:
Observe that the response contains the contents of the