๐ Vulnerability:
This lab contains a path traversal vulnerability in the display of product images.
โ ๏ธ The application blocks traversal sequences like ../
However, it treats the supplied filename as relative to a default working directory.
Retrieve the contents of the file:
/etc/passwd
../).<https://0a0000dd04bcfab0830f0501000c0070.web-security-academy.net/image?filename=/etc/passwd>
๐ก Use Burp Suite to intercept the request.
โ๏ธ Modify the filename parameter in the intercepted request and send it.
๐ The contents of /etc/passwd will be displayed
