http://r2km7u25qebaefa7b6jdcjldymc2u337vzpx7ne773ypgs3qlq4xycqd.onion/index.php?page=Corrosion-1
FUZZ=/etc/passwd -w /path/to/SecLists/Discovery/Web-Content/burp-parameter-names.txt This revealed that the script had a parameter named "file" that was vulnerable to path traversal/LFI: file [Status: 200, Size: 2832, Words: 38, Lines: 49, Duration: 1ms] Local File Inclusion (LFI) Vulnerability Using the discovered parameter, I was able to read the server's /etc/passwd file:...