结构: Simple
Abstraction: Base
状态: Draft
被利用可能性: unkown
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
cwe_Nature: ChildOf cwe_CWE_ID: 22 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 22 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Integrity', 'Confidentiality', 'Availability'] | Execute Unauthorized Code or Commands | The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries. |
Integrity | Modify Files or Directories | The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow an attacker to bypass authentication. |
Confidentiality | Read Files or Directories | The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing attacks in order to break into an account on the system. |
Availability | DoS: Crash, Exit, or Restart | The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the software from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the software. |
In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.
bad Java
However, the path is not validated or modified to prevent it from containing absolute path sequences before creating the File object. This allows anyone who can control the system property to determine what file is used. Ideally, the path should be resolved relative to some kind of application or user home directory.
The following code demonstrates the unrestricted upload of a file with a Java servlet and a path traversal vulnerability. The action attribute of an HTML form is sending the upload file request to the Java servlet.
good HTML
When submitted the Java servlet's doPost method will receive the request, extract the name of the file from the Http request header, read the file contents from the request and output the file to the local upload directory.
bad Java
As with the previous example this code does not perform a check on the type of the file being uploaded. This could allow an attacker to upload any executable file or other file with malicious code.
Additionally, the creation of the BufferedWriter object is subject to relative path traversal (CWE-22, CWE-23). Depending on the executing environment, the attacker may be able to specify arbitrary files to write to, leading to a wide variety of consequences, from code execution, XSS (CWE-79), or system crash.
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1345 | Multiple FTP clients write arbitrary files via absolute paths in server responses | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1345 |
CVE-2001-1269 | ZIP file extractor allows full path | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1269 |
CVE-2002-1818 | Path traversal using absolute pathname | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1818 |
CVE-2002-1913 | Path traversal using absolute pathname | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1913 |
CVE-2005-2147 | Path traversal using absolute pathname | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2147 |
CVE-2000-0614 | Arbitrary files may be overwritten via compressed attachments that specify absolute path names for the decompressed output. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0614 |
CVE-1999-1263 | Mail client allows remote attackers to overwrite arbitrary files via an e-mail message containing a uuencoded attachment that specifies the full pathname for the file to be modified. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1263 |
CVE-2003-0753 | Remote attackers can read arbitrary files via a full pathname to the target file in config parameter. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0753 |
CVE-2002-1525 | Remote attackers can read arbitrary files via an absolute pathname. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1525 |
CVE-2001-0038 | Remote attackers can read arbitrary files by specifying the drive letter in the requested URL. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0038 |
CVE-2001-0255 | FTP server allows remote attackers to list arbitrary directories by using the "ls" command and including the drive letter name (e.g. C:) in the requested pathname. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0255 |
CVE-2001-0933 | FTP server allows remote attackers to list the contents of arbitrary drives via a ls command that includes the drive letter as an argument. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0933 |
CVE-2002-0466 | Server allows remote attackers to browse arbitrary directories via a full pathname in the arguments to certain dynamic pages. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0466 |
CVE-2002-1483 | Remote attackers can read arbitrary files via an HTTP request whose argument is a filename of the form "C:" (Drive letter), "//absolute/path", or ".." . | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1483 |
CVE-2004-2488 | FTP server read/access arbitrary files using "C:\" filenames | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2488 |
CVE-2001-0687 | FTP server allows a remote attacker to retrieve privileged web server system information by specifying arbitrary paths in the UNC format (\computername\sharename). | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0687 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Absolute Path Traversal | ||
Software Fault Patterns | SFP16 | Path Traversal |