Filename Leads to Path Traversal

3 years ago 219
BOOK THIS SPACE FOR AD
ARTICLE AD

Sesank Munukutla

Hello..! My Name Is Surya Sesank.M. I Am Freelancer & Pentester. Today I am Going to Share Path Traversal that leads to Sensitive Information. I did this in a private program that was not disclosed to the public so I name it test.com

A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the webroot folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on the file system including application source code or configuration and critical system files.

Let's Get into the Movie….!

It is a shopping site, I check all the parameters of the website and I got a subdomain with an endpoint of product id & with an upload file https://www.tset.com/product=1? this leads to giving the stock information of product id in the backend with another subdomain.

I opened up the burp suite and check the website's back-end process and I got the filename parameter for XSS.

Then I checked twice to upload a file in the filename parameter but it didn't work and tried image to exploit the XSS through Image XSS upload creation with an image.svg.jpg. it also not worked.

I took a break and came back tried to do it in another Way. With the Help of Medium article and youtube channels then I found the way to find the root.

I simply captured the request and it went to 200 OK. Then I tried to bypass some payloads to get the root of the website.

some of them are

../etc/passwd

../../..//etc/passwd

…./….//…./?etc/passwd

..//..//..//etc/passwd%00.png

I tried a few more to bypass it. and you can automate this with a Tool from GitHub from manual to automate.

Finally ….! Boom I gotch it. I got to the root of the website which is a path traversal and gives sensitive information.

finally, I reported it to them .. they Accepted it as a valid one and it Was P3. Still waiting for a replay.

All you need is patience.

Read Entire Article