 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 123
Members: 0
Total: 123
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Q : How to bypass Directory Protection |
 |
Posted: Mon May 09, 2005 12:56 am |
|
|
d3vilbox |
Beginner |

 |
|
Joined: May 02, 2005 |
Posts: 3 |
|
|
|
 |
 |
 |
|
sup guyz ?
There is so many dynamic pages for managing and implementing file-download (ex:download.php).
if there is no local file permission set and name of file which should be pased by dynamic page to user is passed to dynamic page by user`s request ,It`s possible to inject ../ and ... at the beggining of file name and change file name to download server side codes of dynamic pages ( ASPX,ASP,PHP etc)
Web developers filter user`s requested file-name and check if it has malicious characters ( .. or %2e%2e , etc ) or not.
there is many ways to bypass such chr-filtering :
1) ..
2) %2e%2e ( hex encoded )
3) %2e.
4) .%2e
5) / ( and hex endcoded)
6) \ ( and hex endcoded)
there is some methods at ASP.NET and ASP to bypass such filtering :
1)using %00 (null) to change signiture of threat (injected file-name)
2)encoding characters by their Unicode format ( \u## \u####,\u######)
Q : is it possible to bypass download.php?filename=[Directory traversal]
which uses # 1,2,3,4 ( but not 5,6) filtering ?
Q : why download.php?filename=[Directory traversal] changes %00 (null) to \ when using injected-path ?
Q : is Unicode encoding (\u#### etc) possible at PHP or not ?
Q: any other idea ?
Sorry 4 my bad english
PS: oh I forgot , I`m working on new method of Security-analyzing at web applications to find security-vulnerablities and i could test it on some popular PHP web portals and got some SQL-Injection and ... bugs , i need parthner to help me, there are some SQl statements which i cannot write exploit for them ( d3vilbox [a .. t] yahoo d0t com )
tnx |
|
|
|
|
 |
www.waraxe.us Forum Index -> General discussion
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|