Post

YesWeHack ⠵
YesWeHack ⠵@yeswehack·
Vulnerable Code Snippets Time 🥷 Level: Medium 🐝 This web application does not like dot dot slash! Try it out at Github: github.com/yeswehack/vuln… #BugBounty #YesWeRHackers Found the issue? Explain how in the comments! 👇 🎁 The best solution gets an exclusive swag!
YesWeHack ⠵ tweet media
English
8
11
63
15K
brendan
brendan@bscarvell·
@yeswehack You can provide an absolute path. ?file=/etc/passwd
English
1
0
2
414
Budanthara
Budanthara@budanthara·
@yeswehack There are several bugs, but I just highlighted those two functions related with the preg_replace() and str_contains(). The regex inside preg_replace() function only filter specific patterns -> "://" or "\\", and the str_contains() only filter the "../".
English
2
0
1
320
Yuval
Yuval@yuvalgal_·
@yeswehack @yeswehack Besides LFI using methods already commented, there is a reflected XSS vuln. 'http://e.vil/p.html' will be filtered, but we can use the fact filtering '://' is separate from '../' to construct 'http:..///e.vil/p.html' and file is a GET param so we can send bad link.
English
1
0
1
219
maggick
maggick@maggick_fr·
@yeswehack LFI with a bad user input sanitation. Assuming it is running on a GNU/Linux server the payload `file=..%252f..%252f..%252fetc/passwd` should allow to retrieve the file.
English
1
0
1
520
Avinash kumar
Avinash kumar@Avinashkroy·
@yeswehack Although "../" is filtered recursively to prevent LFI but preg_replace filter is NON RECURSIVE and only filters group of character like(://) instead of single malicious characters. So ?file=/etc/hostname or ?file=file:://///etc/hostname bypasses filter.
Avinash kumar tweet mediaAvinash kumar tweet media
English
0
0
5
300
sh
sh@_shellehs_·
@yeswehack LFI by providing: http://127.0.0.1:5000/?file=file:/..///etc/passwd
English
1
0
1
1K
Paylaş