22 lines
501 B
Markdown
22 lines
501 B
Markdown
|
|
||
|
## Overview
|
||
|
|
||
|
![[Screenshot from 2022-12-02 11-06-41.png]]
|
||
|
|
||
|
- Allows an attacker to read files on the server that is running the application
|
||
|
- Code
|
||
|
- Data
|
||
|
- Credentials
|
||
|
- Sensitive OS files
|
||
|
- Might even be able to write to files on the server
|
||
|
|
||
|
Example Exploit:
|
||
|
- Shopping application that loads images via HTML:
|
||
|
```
|
||
|
<imgsrc="/loadImage?filename=218.png">
|
||
|
```
|
||
|
- Attacker could request the following:
|
||
|
```
|
||
|
https://insecure-website.com/loadImage?filename=../../../etc/passwd
|
||
|
```
|