webeasy

Path Traversal

hackerdna

Task: Vulnerable Apache 2.4.49 file server with CGI script accepting file parameter. Solution: Path traversal via unsanitized file parameter to read /flag.txt using ../ sequences.

$ ls tags/ techniques/
Path traversal via unsanitized file parameterDirectory traversal with ../ sequencesCGI script parameter injectionApache 2.4.49 CVE-2021-41773 identification

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]