1. Exploit path traversal vulnerabilities

1. Exploit path traversal vulnerabilities

<aside> ℹ️

A classic path traversal attack (also known as directory traversal) allows an attacker to access files that are stored outside the web root folder.

</aside>

Path traversal issues in Java web applications are not so well understood because the attacker usually cannot access files from the root directory. There are exceptions to this, but in most cases I’ve encountered, the attacker can only access the files from the application context root.

Grabbing WEB-INF/web.xml

The obvious start is to read the deployment descriptor file /WEB-INF/web.xml

However, in many cases, the deployment descriptor file /WEB-INF/web.xml ****doesn’t contain any sensitive information.

Trying to read well-known Java files

In the accompanying tool, there is a wordlist that contains a list of well-known Java files, compiled by searching github.com for Java web applications.

https://github.com/Invicti-Security/web-inf-path-trav