Challenge 2: Directory Traversal
What is directory traversal?
http://some-site.com/get-file?file=rules.html -- A legitimate URL
http://some-site.com/get-file?file=../../../../../etc/passwd -- An exploit, with parent directory references
http://some-site.com/get-file?file=/etc/passwd - Same exploit, but with absolute pathCreating the vulnerable system (and the vulnerability)
<-- \templates\protected\facilities\earth.html -->
<-- This is just a temporary placeholder page while we develop the challenge, you can edit this however you like -->
{% extends 'base.html' %}
{% block head %}
<link rel="stylesheet" href="{{ url_for('static', filename='/css/facilities.css') }}">
{% endblock %}
{% block title %}Facilities and Safehouses{% endblock %}
{% block content %}
secret page
{% endblock %}
{% block scripts %}
{% endblock %}







Protecting actual files
Conclusion
Last updated