hacktricks/pentesting-web/client-side-path-traversal.md

40 lines
3 KiB
Markdown
Raw Normal View History

# Kliëntkant Pad Traversal
2023-01-13 10:30:46 +00:00
{% hint style="success" %}
Leer & oefen AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Opleiding AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Leer & oefen GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Opleiding GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2023-01-13 10:30:46 +00:00
<details>
2023-01-13 10:30:46 +00:00
<summary>Ondersteun HackTricks</summary>
2024-02-03 12:22:53 +00:00
* Kyk na die [**subskripsie planne**](https://github.com/sponsors/carlospolop)!
* **Sluit aan by die** 💬 [**Discord groep**](https://discord.gg/hRep4RUj7f) of die [**telegram groep**](https://t.me/peass) of **volg** ons op **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Deel hacking truuks deur PRs in te dien na die** [**HackTricks**](https://github.com/carlospolop/hacktricks) en [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2023-01-13 10:30:46 +00:00
</details>
{% endhint %}
2023-01-13 10:30:46 +00:00
2024-02-11 02:07:06 +00:00
## Basiese Inligting
2023-01-13 10:30:46 +00:00
'n Kliëntkant pad traversal gebeur wanneer jy die **pad van 'n URL** kan **manipuleer** wat **gestuur gaan word na 'n gebruiker om op 'n regte manier te besoek** of dat 'n gebruiker op een of ander manier **gedwonge gaan word om te besoek byvoorbeeld via JS of CSS**.
2023-01-13 10:30:46 +00:00
In [**hierdie skrywe**](https://erasec.be/blog/client-side-path-manipulation/), was dit moontlik om die **uitnodigings-URL** te **verander** sodat dit sou eindig met **die kansellasie van 'n kaart**.
2023-01-13 10:30:46 +00:00
In [**hierdie skrywe**](https://mr-medi.github.io/research/2022/11/04/practical-client-side-path-traversal-attacks.html), was dit moontlik om 'n **kliëntkant pad traversal via CSS** (dit was moontlik om die pad te verander waar 'n CSS hulpbron gelaai is) te kombineer met 'n **oop omleiding** om die CSS hulpbron van 'n **aanvaller beheerde domein** te laai.
2023-01-13 10:30:46 +00:00
{% hint style="success" %}
Leer & oefen AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Opleiding AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Leer & oefen GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Opleiding GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2023-01-13 10:30:46 +00:00
<details>
2023-01-13 10:30:46 +00:00
<summary>Ondersteun HackTricks</summary>
2024-02-03 12:22:53 +00:00
* Kyk na die [**subskripsie planne**](https://github.com/sponsors/carlospolop)!
* **Sluit aan by die** 💬 [**Discord groep**](https://discord.gg/hRep4RUj7f) of die [**telegram groep**](https://t.me/peass) of **volg** ons op **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Deel hacking truuks deur PRs in te dien na die** [**HackTricks**](https://github.com/carlospolop/hacktricks) en [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2023-01-13 10:30:46 +00:00
</details>
{% endhint %}