Back to Browse

Python Directory Traversal Exploit [Yummy - HackTheBox]

993 views
Feb 22, 2025
32:56

In Yummy from HackTheBox, I've got a file read vulnerability that takes two requests to trigger, as well as a bit of setup with the website. I'll write a shell that takes a filename, returns the contents of the file (or the reason it can't), and then reprompts using the Python Cmd package and requests. To get requests to do the directory traversal correctly, I'll use the prepare mechanism. Full Yummy Solution: https://0xdf.gitlab.io/2025/02/22/htb-yummy.html ☕ Buy Me A Coffee: https://www.buymeacoffee.com/0xdf [00:00] Introduction [01:00] Vulnerability demo [04:18] Intial CMD shell [07:25] __init__ [08:26] login function [10:20] Get valid booking ID [16:20] Default command [19:38] Preparing request for traversal [24:09] Update to handle any file [24:55] Checks for access denied and file not found [27:01] Adding file download [31:45] Conclusion #HackTheBox #ctf #xss

Download

0 formats

No download links available.

Python Directory Traversal Exploit [Yummy - HackTheBox] | NatokHD