info :
This lab contains a path traversal vulnerability in the display of product images.
The application blocks input containing path traversal sequences. It then performs a URL-decode of the input before using it.
Goal :
To solve the lab, retrieve the contents of the /etc/passwd file.
🧠Lab Overview:
This lab contains a file path traversal vulnerability, but with an extra layer of input sanitization. Specifically, the application:
../ from user input.The goal is to read the contents of the /etc/passwd file using a crafted filename input.
../etc/passwd would be blocked by the input filter.%2e%2e%2f would also be stripped or rejected.
We need to send an input that looks harmless during filtering, but becomes malicious after URL-decoding.