You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm trying to test a local file include template where the BaseURL includes the encoded path to the file in question. For example: https://example.com:443/%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fetc/passwd
However, Nuclei is decoding the URL path and sending it off, which doesn't trigger the vulnerability. Is there a way I can have the BaseURL variable not modify the URL it's given?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
I'm trying to test a local file include template where the BaseURL includes the encoded path to the file in question. For example:
https://example.com:443/%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252fetc/passwd
However, Nuclei is decoding the URL path and sending it off, which doesn't trigger the vulnerability. Is there a way I can have the BaseURL variable not modify the URL it's given?
Beta Was this translation helpful? Give feedback.
All reactions