“From a 404 Page to $5k: How I Chained Forgotten Bugs Into a Critical Exploit”
从看似无用的路径遍历漏洞入手,通过深入分析和创造性思考,成功将其转化为远程代码执行,并获得高额赏金。 2025-7-19 13:13:11 Author: infosecwriteups.com(查看原文) 阅读量:15 收藏

Aman Sharma

We’ve all been there — staring at what seems like a dead-end vulnerability, wondering if it’s even worth reporting. I almost made that mistake too, until one “low-risk” finding unexpectedly turned into my biggest bounty yet. Here’s the full breakdown of how persistence and creative thinking turned a simple path traversal into remote code execution.

free link | friend link

It began with what most would consider a dead end:

http://admin.target.com:8443/admin/Download  

A blank page with a 200 status code. Most scanners would mark this as “nothing here” and move on. But in security research, empty responses often hide the most interesting secrets.

After parameter testing, I discovered:

http://admin.target.com:8443/admin/Download?filename=/js/main.js  

This returned the actual JavaScript file — confirming Local File Inclusion (LFI). The limitations seemed frustrating at first:

  • Only accessible within /admin/ directory

文章来源: https://infosecwriteups.com/from-a-404-page-to-5k-how-i-chained-forgotten-bugs-into-a-critical-exploit-cbb88e0f6516?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh