“From a 404 Page to $5k: How I Chained Forgotten Bugs Into a Critical Exploit”
从看似无用的漏洞入手,通过参数测试发现本地文件包含(LFI)漏洞,利用特殊路径构造请求,最终实现远程代码执行(RCE),获得高额奖金,展现了耐心和创造力在安全研究中的重要性。 2025-7-19 13:13:11 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

Aman Sharma

We’ve all been there — staring at what seems like a dead-end vulnerability, wondering if it’s even worth reporting. I almost made that mistake too, until one “low-risk” finding unexpectedly turned into my biggest bounty yet. Here’s the full breakdown of how persistence and creative thinking turned a simple path traversal into remote code execution.

free link | friend link

It began with what most would consider a dead end:

http://admin.target.com:8443/admin/Download  

A blank page with a 200 status code. Most scanners would mark this as “nothing here” and move on. But in security research, empty responses often hide the most interesting secrets.

After parameter testing, I discovered:

http://admin.target.com:8443/admin/Download?filename=/js/main.js  

This returned the actual JavaScript file — confirming Local File Inclusion (LFI). The limitations seemed frustrating at first:

  • Only accessible within /admin/ directory

文章来源: https://infosecwriteups.com/from-a-404-page-to-5k-how-i-chained-forgotten-bugs-into-a-critical-exploit-cbb88e0f6516?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh