vidually, it may be that the application is implementing multiple types of
filters, and so you need to combine several of these attacks simultane-
ously (both against traversal sequence filters and file type or directory fil-
ters). If possible, the best approach here is to try to break the problem
down into separate stages. For example, if the request for
diagram1.jpg
Continued
Chapter 10
■
Exploiting Path Traversal
341
70779c10.qxd:WileyRed 9/14/07 3:14 PM Page 341
HACK STEPS (continued)
is successful, but the request for
foo/../diagram1.jpg
fails, then try all of the possible traversal sequence bypasses until a
variation on the second request is successful. If these successful traversal
Do'stlaringiz bilan baham: |