About 300 results
Open links in new tab
  1. What is path traversal, and how to prevent it? - PortSwigger

    Path traversal is also known as directory traversal. These vulnerabilities enable an attacker to read arbitrary files on the server that is running an application.

  2. Testing for directory traversal vulnerabilities with Burp Suite

    Dec 16, 2025 · Directory traversal vulnerabilities (also known as file path vulnerabilities) allow an attacker to read arbitrary files on the server that is running an application.

  3. File path traversal - PortSwigger

    File path traversal (also known as directory traversal) is a vulnerability that allows attackers to read the contents of files to which they should not have access.

  4. Path traversal - PortSwigger

    Path traversal This learning path covers path traversal vulnerabilities. You'll learn how to carry out path traversal attacks and circumvent common obstacles. You'll also learn how to prevent path …

  5. Using Burp to Test for Path Traversal Vulnerabilities

    Many types of functionality commonly found in web applications involve processing user-supplied input as a file or directory name. If the user-supplied input is improperly validated, this …

  6. Fuzzing for vulnerabilities - PortSwigger

    Dec 16, 2025 · Fuzzing for vulnerabilities Last updated: December 16, 2025 Read time: 1 Minute You can use Burp Intruder to identify input-based vulnerabilities by analyzing the attack results …

  7. Lab: File path traversal, simple case | Web Security Academy

    This lab contains a path traversal vulnerability in the display of product images. To solve the lab, retrieve the contents of the /etc/passwd file.

  8. What is Web Vulnerability Scanning? A Guide from PortSwigger

    Some path traversal vulnerabilities can be detected by submitting a traversal sequence targeting a known file, and searching the response for the appearance of this file.

  9. NGINX Alias Traversal - PortSwigger

    To eliminate false positives the misconfiguration has to be confirmed by successfully requesting an existing resource via path traversal. This is done as follows:

  10. Lab: Web shell upload via path traversal - PortSwigger

    This indicates that the file was uploaded to a higher directory in the filesystem hierarchy (/files), and subsequently executed by the server. Note that this means you can also request this file …