Triaging an LFI Vulnerability Report

Anonymous Traiger
4 min readDec 30, 2024

The report landed in my queue late in the evening, and at first glance, it seemed like a straightforward Local File Inclusion (LFI) vulnerability. The hunter claimed they had managed to access sensitive files on the target server by exploiting a directory traversal flaw in the page parameter. Intrigued, I decided to dig deeper.

The Alleged Vulnerability

The hunter’s report began innocuously, describing the behavior of the vulnerable endpoint:

www.target.com/rd?page=/change/lmtstats.html

When accessed, it returned a valid HTML file. They suspected that manipulating the page parameter with directory traversal sequences (../) could grant access to unauthorized files on the server.

To illustrate, they provided an example:

www.target.com/rd?page=../../../etc/passwd

According to the hunter, this revealed the contents of /etc/passwd, a file critical to the system's security. The hunter also shared their suspicion that the endpoint could be further abused, potentially escalating to Remote Code Execution (RCE).

--

--

No responses yet