webProeasy
Path Traversal
hackerdna
Task: Vulnerable Apache 2.4.49 file server with CGI script accepting file parameter. Solution: Path traversal via unsanitized file parameter to read /flag.txt using ../ sequences.
$ ls tags/ techniques/
Path traversal via unsanitized file parameterDirectory traversal with ../ sequencesCGI script parameter injectionApache 2.4.49 CVE-2021-41773 identification
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pentest][free]WingData (Wing FTP RCE → Python tarfile PATH_MAX bypass)— hackthebox
- [web][Pro]Lab 209 — BuildForge — Path Traversal in Static File Serving— hackadvisor
- [infra][Pro]Скрипт-кидди (Script-kiddie)— hackerlab
- [web][Pro]FAVn— web-kids20
- [forensics][Pro]Log Hunter— hackerdna