File path traversal, validation of start of path
Description
This lab contains a file path traversal vulnerability in the display of product images. The application transmits the full file path via a request parameter, and validates that the supplied path starts with the expected folder.
Reproduction and proof of concept
Use Burp Suite to intercept and modify a request that fetches a product image.
Modify the
filename
parameter, giving it the value:/var/www/images/../../../etc/passwd
The response contains the contents of the
/etc/passwd
file.
Exploitability
An attacker will need to retrieve the contents of the /etc/passwd
file.