结构: Simple
Abstraction: Variant
状态: Incomplete
被利用可能性: unkown
A software system that accepts path input in the form of multiple leading slash ('//multiple/leading/slash') without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 699 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 161 cwe_View_ID: 1000
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Confidentiality', 'Integrity'] | ['Read Files or Directories', 'Modify Files or Directories'] |
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1483 | Read files with full pathname using multiple internal slash. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1483 |
CVE-1999-1456 | Server allows remote attackers to read arbitrary files via a GET request with more than one leading / (slash) character in the filename. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1456 |
CVE-2004-0578 | Server allows remote attackers to read arbitrary files via leading slash (//) characters in a URL request. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0578 |
CVE-2002-0275 | Server allows remote attackers to bypass authentication and read restricted files via an extra / (slash) in the requested URL. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0275 |
CVE-2004-1032 | Product allows local users to delete arbitrary files or create arbitrary empty files via a target filename with a large number of leading slash (/) characters. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1032 |
CVE-2002-1238 | Server allows remote attackers to bypass access restrictions for files via an HTTP request with a sequence of multiple / (slash) characters such as http://www.example.com///file/. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1238 |
CVE-2004-1878 | Product allows remote attackers to bypass authentication, obtain sensitive information, or gain access via a direct request to admin/user.pl preceded by // (double leading slash). | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1878 |
CVE-2005-1365 | Server allows remote attackers to execute arbitrary commands via a URL with multiple leading "/" (slash) characters and ".." sequences. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1365 |
CVE-2000-1050 | Access directory using multiple leading slash. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1050 |
CVE-2001-1072 | Bypass access restrictions via multiple leading slash, which causes a regular expression to fail. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1072 |
CVE-2004-0235 | Archive extracts to arbitrary files using multiple leading slash in filenames in the archive. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0235 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | //multiple/leading/slash ('multiple leading slash') | ||
Software Fault Patterns | SFP16 | Path Traversal |