Path Traversal |
Category ID: 126 | Status: Draft |
Summary
An attacker uses path manipulation methods to exploit insufficient input validation of a target to obtain access to data that should be not be retrievable by ordinary well formed requests. A typical variety of this attack involves specifiying a path to a desired file together with dot-dot-slash characters, resulting in the file access API or function traversing out of the intended directory structure and into the root file system. By replacing or modifying the expected path information the access function or API retrieves the file desired by the attacker.These attacks either involve the attacker providing a complete path to a targeted file or using control characters (e.g. path separators (/ or \) and/or dots (.)) to reach desired directories or files.
The attacker must be able to control the path that is requested of the target.
The target must fail to adequately sanitize incoming paths
The ability to manually manipulate path information either directly through a client application relative to the service or application or via a proxy application.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 154 | Resource Location Attacks | Mechanism of Attack1000 | |
ChildOf | ![]() | 366 | WASC Threat Classification 2.0 - WASC-33 - Path Traversal | WASC Threat Classification 2.0333 | |
ParentOf | ![]() | 64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 78 | Using Escaped Slashes in Alternate Encoding | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 79 | Using Slashes in Alternate Encoding | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 139 | Relative Path Traversal | Mechanism of Attack (primary)1000 |