The Web Application Hacker’s Handbook Discovering and Exploiting Security Flaws



Download 5,76 Mb.
Pdf ko'rish
bet603/875
Sana01.01.2022
Hajmi5,76 Mb.
#293004
1   ...   599   600   601   602   603   604   605   606   ...   875
Bog'liq
3794 1008 4334

346

Chapter 10 



Exploiting Path Traversal

70779c10.qxd:WileyRed  9/14/07  3:14 PM  Page 346



The application returns the following error message:

passwd.log not found in /etc directory!

What input should you submit next to try to retrieve the 

passwd


file?

2. You are probing for path traversal flaws in a file download function.

The following URL returns the file called 

foo.txt


:

https://wahh-app.com/showFile.php?f=foo.txt

After some experimentation, you discover that supplying the input

../foo.txt

returns the original file, whereas supplying the input

bar/../foo.txt

returns an error.

What might be the cause of this unusual behavior, and how can you

attempt to refine your attack?

3. An application uses URLs like the following to view various configura-

tion files:

https://wahh-app.com/manage/customize.asp?file=default.xml

You have determined that the file specified is normally retrieved from

the 


/contrib

directory within the web root. However, requesting the

following URL:

https://wahh-app.com/manage/customize.asp?file=../../../../boot.ini

results in an HTTP 500 status code and the following error message:

Microsoft VBScript runtime (0x800A0046)

Permission denied

What is the likely cause of this message, and how can you proceed

towards exploitation?

4. You have located a file handling function that appears to be vulnerable

to path traversal attacks. However, you have no idea what the location

of the starting directory is, or how many traversal sequences you need

to insert to get to the file system root. How can you proceed without

this information?

5. You have located a path traversal vulnerability. However the starting

directory is within a separate logical volume that is only used for

hosted web content. Is it possible to exploit this vulnerability to any

malicious effect?




Download 5,76 Mb.

Do'stlaringiz bilan baham:
1   ...   599   600   601   602   603   604   605   606   ...   875




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish