Read Time:51 Second
Description
A software system that accepts path input in the form of trailing slash (‘filedir/’) without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
Modes of Introduction:
– Implementation
Related Weaknesses
Consequences
Confidentiality, Integrity: Read Files or Directories, Modify Files or Directories
Potential Mitigations
CVE References
- CVE-2002-0253
- Overlaps infoleak
- CVE-2001-0446
- Application server allows remote attackers to read source code for .jsp files by appending a / to the requested URL.
- CVE-2004-0334
- Bypass Basic Authentication for files using trailing “/”
- CVE-2001-0893
- Read sensitive files with trailing “/”
- CVE-2001-0892
- Web server allows remote attackers to view sensitive files under the document root (such as .htpasswd) via a GET request with a trailing /.
- CVE-2004-1814
- Directory traversal vulnerability in server allows remote attackers to read protected files via .. (dot dot) sequences in an HTTP request.
- BID:3518
- Source code disclosure