You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am a pentester, test.php produced an arbitrary file read vulnerability for one of my clients. We were able to read files all over the filesystem and gained access to sensitive keys, source code, etc by using directory traversal characters with the File parameter. Contents of the file get chopped into arrays but are nonetheless present.
The text was updated successfully, but these errors were encountered:
I am a pentester, test.php produced an arbitrary file read vulnerability for one of my clients. We were able to read files all over the filesystem and gained access to sensitive keys, source code, etc by using directory traversal characters with the File parameter. Contents of the file get chopped into arrays but are nonetheless present.
Can confirm this. The "File" parameter can be altered to point to arbitrary locations even outside of the applications scope.
I am a pentester, test.php produced an arbitrary file read vulnerability for one of my clients. We were able to read files all over the filesystem and gained access to sensitive keys, source code, etc by using directory traversal characters with the File parameter. Contents of the file get chopped into arrays but are nonetheless present.
The text was updated successfully, but these errors were encountered: