path_traversal_test
Test web applications for path traversal vulnerabilities by attempting to read server files using encoded payloads at multiple directory depths.
Instructions
Test path traversal with encoding variants at multiple depths. Tries plain ../, URL-encoded %2e%2e/, double-encoded %252e%252e/, and null-byte/truncation bypasses. Returns results array with payload, status, length, contains_target per attempt, and vulnerable_payloads list. Side effects: Read-only GET requests. Sends ~32 requests.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | URL with file parameter, e.g. https://target/image?filename=photo.jpg | |
| parameter | Yes | Parameter that accepts filenames | |
| target_file | No | Server file to attempt reading | |
| depth | No | Maximum directory traversal depth |