Skip to content

Testing for Directory Traversal File Vulnerabilities #845

@ImanSharaf

Description

@ImanSharaf

There could be a case that you can add to this document. There was a situation that my target was not vulnerable against Directory Traversal Attack in a normal way, but it was allowing me to upload a compressed folder, I was able to upload a PHP shell file in a folder that had the permission to execute the file by doing this:
1- Create a zip file with a Python code and for the name of the target file to be compressed use something like this ../../../../../../../../var/www/target/root/shell.php [we cannot do it using normal applications that can ZIP files]
I believe this trick should be mentioned in WSTG somewhere.

Metadata

Metadata

Assignees

Labels

newNew content to write

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions