Path traversal
Understanding Path Traversal
What is Path Traversal?
Vulnerable Code Example
// PHP vulnerable file reading
$file = $_GET['file'];
$content = file_get_contents('/var/www/html/uploads/' . $file);
echo $content;How Path Traversal Works
Common Path Traversal Sequences
Impact and Consequences
Common Vulnerable Scenarios
File Download/View Functionality
File Upload Paths
Include/Require Operations
Basic Path Traversal Techniques
Simple Directory Traversal
Basic Dot-Dot-Slash
Absolute Path Access
Mixed Traversal Techniques
URL Encoding Bypass
Single URL Encoding
Double URL Encoding
Unicode and UTF-8 Encoding
Filter Evasion Techniques
Null Byte Injection
Case Variation
Alternative Separators
Character Substitution
Advanced Path Traversal Techniques
Deep Directory Traversal
Excessive Dot-Dot Sequences
Nested Path Construction
Application-Specific Bypasses
Framework-Specific Techniques
Operating System Specific
Filter Bypass Combinations
Multi-Encoding Techniques
Whitespace and Special Characters
Path Normalization Bypass
Platform-Specific Exploitation
Linux/Unix Systems
System File Access
Application Files
Windows Systems
System File Access
IIS and ASP.NET Files
Web Application Context Exploitation
File Download Vulnerabilities
Document Management Systems
Image and Media Galleries
File Upload Vulnerabilities
Upload Path Manipulation
Template and Include Vulnerabilities
Template Engine Exploitation
Advanced Exploitation Scenarios
Chained Attacks
Path Traversal to RCE
Information Gathering Chain
Container and Cloud Exploitation
Docker Container Escape
Kubernetes Pod Escape
Cloud Metadata Access
Language and Framework Specific
PHP Applications
PHP-Specific Vulnerabilities
PHP Configuration Files
Java Applications
Java-Specific Paths
Python Applications
Python-Specific Files
Python Virtual Environments
Node.js Applications
Node.js Specific Files
Last updated
Was this helpful?