Contents

🌐 File path traversal, traversal sequences stripped non-recursively

Detailed analysis of the lab 'File path traversal, traversal sequences stripped non-recursively' from the PortSwigger Academy Path traversal series

/images/PortSwiggerLabs/PathTraversal/Third/lab_overview.png
Lab Overview

📊 Lab Overview

Field Details Additional Info
🏢 Lab Series Path Traversal Lab URL
🗂️ Category Web 🌐
🆔 Lab ID 3 Unique Identifier
⭐ Difficulty 🟡 Practitioner PortSwigger Rating
👤 Author Unknown Credits if available
💡 Hints Used No Assistance utilized
📅 Date 31-03-2025 Date of execution
👨‍💻 Solved By mH4ck3r0n3 User who solved the lab

📝 Lab Information

This lab contains a path traversal vulnerability in the display of product images. The application strips path traversal sequences from the user-supplied filename before using it. To solve the lab, retrieve the contents of the /etc/passwd file.

🔧 Lab Setup & Files

Files and Environment

1
Files: None

🔍 Initial Analysis

First Steps

The analysis was already done in the first lab (File path traversal, simple case), and the vulnerable parameter remains the same. In this challenge, the only difference is that, as stated in the description, the web application strips the path traversal sequences we insert. Let’s move on to the exploitation phase.

🔬 Vulnerability Analysis

Potential Attack Vectors

  • Path Traversal

🎯 Solution Path

Step-by-Step Guide

Initial setup

We just need to understand how the web application processes our input. Since it’s stripping ../, it’s likely performing a replacement on the payload we send. So, if we try ../../../etc/passwd, instead of retrieving the passwd file, we’ll get a Not Found error.

Let’s analyze how the backend code might handle this (I’ll use Python for simplicity). Suppose there’s a replace() function acting on the filename parameter:

1
filename.replace("../", "")

In this case, the replace function will remove all occurrences of ../ from our payload, like this:

/images/PortSwiggerLabs/PathTraversal/Third/replace1.png
First Replace

However, this function is quite easy to bypass. Let’s move on to the exploitation phase to see how!

Exploitation

We need to send a payload that, after the replace() function is applied, results in the final filename ../../../etc/passwd.

What happens if we send ....//....//....//etc/passwd?

/images/PortSwiggerLabs/PathTraversal/Third/replace2.png
Second Replace

As we can see, ../ gets removed. But by removing it, the preceding dots and the following slash merge to form ../ in the final payload.

To give another example, imagine we have "flflagag".replace("flag", ""). When the replace() function finds "flag", it removes it, but since we originally had "fl____ag", removing "flag" causes "fl" and "ag" to merge back together, reconstructing "flag".

This is how we bypass the filter!

So, we simply need to send filename=....//....//....//etc/passwd like this:

1
https://0ae0009d0419b8b48695da4600b6009a.web-security-academy.net/image?filename=....//....//....//etc/passwd

Once done, we’ll successfully read the /etc/passwd file:

/images/PortSwiggerLabs/PathTraversal/Third/passwd.png
Passwd

Solution Confirmation

/images/PortSwiggerLabs/PathTraversal/Third/lab_solution.png
Lab Solution

🛠️ Exploitation Process

Technical Approach

The automatic exploit performs a GET request to the vulnerable URL, setting the parameter filename=....//....//....//etc/passwd. It then extracts the content of the /etc/passwd file from the response and displays it.

🚩 Lab Outcome

1
Lab solved successfully!

Proof of Execution

/images/PortSwiggerLabs/PathTraversal/Third/proof_of_exploit.png
Proof Of Exploit
Screenshot or log showing successful exploitation

🔧 Tools & Resources

Primary Arsenal

Tool Purpose
Python Exploit
WebDevTools Request Analysis

💡 Key Learnings

Personal Improvements

  • Web Exploitation

📚 References & Resources

Official Documentation

Learning Resources


📊 Final Statistics

Metric Value Notes
Time to Solve 00:05 Total time taken
Lab ID 3 Lab Identifier

Created: 31-03-2025 • Last Modified: 31-03-2025
Author: mH4ck3r0n3