Basic Bypasses
The above web application employs more than one filter to avoid LFI exploitation. Try to bypass these filters to read /flag.txt
Step 1 - Acess the Web Application
Select a language - the vulnerable parameter is language.

Step 2 - Access the flag file on the root directory
The application is filtering
../
so lets add...//
to navigate through the directories

And flag retrieved!
Last updated