Solving Portswigger Academy: File path traversal, traversal sequences blocked with absolute path bypass

Vishal
2 min readSep 22, 2024

--

In this lab the challenge is to read the contents of /etc/passwd file but here attacker can’t use the traversal sequence ../../ as it is blocked.

An absolute path starts from the root(/) directory till the full path and in relative path you just traverse using the notation ../ as you know the exact location of any file. You can read more about the paths here.

Again in burp suite, click on filter settings and select images, using this you are able to see the URL which requests the images.

Requests and Response to the images.

Now select any request and send it to repeater for further testing.

As in earlier challenge we used ../../etc/passwd to read the contents, lets do it again in this challenge. It says bad request, looks like the payload is blocked.

Now lets try with the absolute path i.e. without ../ notations.

We are able to solve the challenge using absolute path.

You can also fuzz this, I am using pro version so there are list of built in payloads. Send the request to the intruder and select the payload list fuzzing-path traversal. Once you select that you will see {base} or {file}. To add your file here you can use match and replace from Payload processing section. In Match regex section, use (\{base}) or (\{file}) and replace it with etc/passwd.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response