๐ Vulnerability:
This lab contains a path traversal vulnerability in the display of product images.
โ ๏ธ The application strips path traversal sequences (e.g., ../) from user-supplied input before using it.
Retrieve the contents of the file:
/etc/passwd
../.We craft an alternative version of the payload that avoids being stripped
../../../etc/passwd => ....//....//....//etc/passwd
๐ This bypasses the basic ../ stripping mechanism and still resolves to the desired file path

๐ธ Result:
๐ You should now see the contents of the /etc/passwd file