This exploit demonstrates a path traversal vulnerability in nginx versions <= 0.6.36. It uses URL-encoded sequences (%5c%2e%2e) to traverse directories and access arbitrary files, such as system.ini, outside the web root.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:nginx <= 0.6.36
No auth needed
Prerequisites:nginx server running a vulnerable version (<= 0.6.36) · access to the web server