webProeasy
Lab 160 — WikiForge — Nginx Alias Path Traversal
hackadvisor
Task: Knowledge base platform serving static assets via Nginx alias — off-by-slash misconfiguration allows path traversal to read arbitrary files. Solution: Discovered config path from commented JS code, exploited /assets../config/.secrets.json to retrieve the flag.
$ ls tags/ techniques/
lfipath_traversalnodejssource_code_analysisnginxaliasmisconfigurationexpresshoneypot_flagoff_by_slash
source_code_analysisnginx_alias_path_traversaloff_by_slash_exploitationclient_side_hint_discovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 209 — BuildForge — Path Traversal in Static File Serving— hackadvisor
- [web][Pro]Lab 161 — PageForge — Path Traversal via Mixed Slash Filter Bypass— hackadvisor
- [web][Pro]DevOps 300k/s— hackerlab
- [web][Pro]Lab 202 — WikiVault — AngularJS Client-Side Template Injection (XSS)— hackadvisor
- [web][Pro]Lab 375 — PageFlow — Web Cache Deception via Path Normalization— hackadvisor