Relative Path Traversal |
Attack Pattern ID: 139 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Relative Path Traversal |
Attack Pattern ID: 139 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Summary
An attacker exploits a weakness in input validation on the target by supplying a specially constructed path utilizing dot-dot-slash characters for the purpose of obtaining access to restricted files or resources. An attacker modifies a known path on the target in order to reach material that is not available through intended channels. These attacks normally involve adding additional path separators (/ or \) and/or dots (.), or encodings thereof, in various combinations in order to reach parent directories or entirely separate trees of the target's directory structure.
The attacker must be able to access at least one legitimate path on the target. It is this path the attacker uses as the base for their modifications.
The attacker must be able to control the path that is requested of the target.
The target must fail to adequately sanitize incoming paths
CWE-ID | Weakness Name | Weakness Relationship Type |
---|---|---|
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | Targeted |
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 126 | Path Traversal | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.