1. Web Security Academy
  2. Directory traversal
  3. Lab

Lab: File path traversal, traversal sequences stripped with superfluous URL-decode

This lab contains a file path traversal vulnerability in the display of product images.

The application blocks input containing path traversal sequences. It then performs a URL-decode of the input before using it.

To solve the lab, retrieve the contents of the /etc/passwd file.

Want to track your progress and have a more personalized learning experience? (It's free!)

Sign up Login