<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=HaZed</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=HaZed"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/HaZed"/>
		<updated>2026-04-26T00:26:06Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Full_Path_Disclosure&amp;diff=28074</id>
		<title>Full Path Disclosure</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Full_Path_Disclosure&amp;diff=28074"/>
				<updated>2008-04-15T15:56:32Z</updated>
		
		<summary type="html">&lt;p&gt;HaZed: /* External References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
Full Path Disclosure (AKA, FPD) vulnerabilities enable the attacker to see the path to the webroot/file.  Eg: /home/omg/htdocs/file/.  Certain vulnerabilities such as using the load_file() (within an SQL injection) query to view page sources require the attacker to have the full path to the file they wish to view.&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
Low to Medium (circumstantial)&lt;br /&gt;
&lt;br /&gt;
==Exploit Likely-Hood==&lt;br /&gt;
Extremely High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
*  '''Empty Array'''&lt;br /&gt;
&lt;br /&gt;
If we have a site that uses a method of requesting a page like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://site.com/index.php?page=about&amp;lt;/pre&amp;gt;&lt;br /&gt;
We can use a method of opening and closing braces and causing the page to output an error.  This method would look like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://site.com/index.php?page[]=about&amp;lt;/pre&amp;gt;&lt;br /&gt;
This renders the page defunct thus spitting out an error:&lt;br /&gt;
&amp;lt;pre&amp;gt;Warning: opendir(Array): failed to open dir: No such file or directory in /home/omg/htdocs/index.php on line 84&lt;br /&gt;
Warning: pg_num_rows(): supplied argument ... in /usr/home/example/html/pie/index.php on line 131&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*  '''Null Session Cookie'''&lt;br /&gt;
&lt;br /&gt;
Another popular and very reliable method of producing errors containing a FPD is to give the page a nulled session using Javascript Injections.&lt;br /&gt;
A simple injection using this method would look something like so:&lt;br /&gt;
&amp;lt;pre&amp;gt;javascript:void(document.cookie=&amp;quot;PHPSESSID=&amp;quot;);&amp;lt;/pre&amp;gt;&lt;br /&gt;
By simply setting the PHPSESSID cookie to nothing (null) we get an error.&lt;br /&gt;
&amp;lt;pre&amp;gt;Warning: session_start() [function.session-start]: The session id contains illegal characters, &lt;br /&gt;
valid characters are a-z, A-Z, 0-9 and '-,' in /home/example/public_html/includes/functions.php on line 2&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Preventing==&lt;br /&gt;
This vulnerability is prevented simply by turning error reporting off so your code does not spit out errors.&lt;br /&gt;
&amp;lt;pre&amp;gt;error_reporting(0);&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Information Disclosure]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[[SQL Injection]]&lt;br /&gt;
*[[Relative Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
It must be put across very clearly that this vulnerability in no way enables an attacker to gain full control of your website.  However, this exploit often accompanies another, more serious one in which this will aid an attacker in controlling your website.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*[http://www.enigmagroup.org/ Articled summarised from Full Path Disclosure article by haZed on EnigmaGroup.org.]&lt;br /&gt;
*[http://www.enigmagroup.org/pages/view_articles/artID/175/ Original article location (registration required).]&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>HaZed</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Full_Path_Disclosure&amp;diff=28073</id>
		<title>Full Path Disclosure</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Full_Path_Disclosure&amp;diff=28073"/>
				<updated>2008-04-15T15:54:49Z</updated>
		
		<summary type="html">&lt;p&gt;HaZed: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Overview==&lt;br /&gt;
Full Path Disclosure (AKA, FPD) vulnerabilities enable the attacker to see the path to the webroot/file.  Eg: /home/omg/htdocs/file/.  Certain vulnerabilities such as using the load_file() (within an SQL injection) query to view page sources require the attacker to have the full path to the file they wish to view.&lt;br /&gt;
&lt;br /&gt;
==Severity==&lt;br /&gt;
Low to Medium (circumstantial)&lt;br /&gt;
&lt;br /&gt;
==Exploit Likely-Hood==&lt;br /&gt;
Extremely High&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
*  '''Empty Array'''&lt;br /&gt;
&lt;br /&gt;
If we have a site that uses a method of requesting a page like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://site.com/index.php?page=about&amp;lt;/pre&amp;gt;&lt;br /&gt;
We can use a method of opening and closing braces and causing the page to output an error.  This method would look like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://site.com/index.php?page[]=about&amp;lt;/pre&amp;gt;&lt;br /&gt;
This renders the page defunct thus spitting out an error:&lt;br /&gt;
&amp;lt;pre&amp;gt;Warning: opendir(Array): failed to open dir: No such file or directory in /home/omg/htdocs/index.php on line 84&lt;br /&gt;
Warning: pg_num_rows(): supplied argument ... in /usr/home/example/html/pie/index.php on line 131&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*  '''Null Session Cookie'''&lt;br /&gt;
&lt;br /&gt;
Another popular and very reliable method of producing errors containing a FPD is to give the page a nulled session using Javascript Injections.&lt;br /&gt;
A simple injection using this method would look something like so:&lt;br /&gt;
&amp;lt;pre&amp;gt;javascript:void(document.cookie=&amp;quot;PHPSESSID=&amp;quot;);&amp;lt;/pre&amp;gt;&lt;br /&gt;
By simply setting the PHPSESSID cookie to nothing (null) we get an error.&lt;br /&gt;
&amp;lt;pre&amp;gt;Warning: session_start() [function.session-start]: The session id contains illegal characters, &lt;br /&gt;
valid characters are a-z, A-Z, 0-9 and '-,' in /home/example/public_html/includes/functions.php on line 2&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Preventing==&lt;br /&gt;
This vulnerability is prevented simply by turning error reporting off so your code does not spit out errors.&lt;br /&gt;
&amp;lt;pre&amp;gt;error_reporting(0);&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Related Threats==&lt;br /&gt;
[[:Category:Information Disclosure]]&lt;br /&gt;
&lt;br /&gt;
==Related Attacks==&lt;br /&gt;
*[[SQL Injection]]&lt;br /&gt;
*[[Relative Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
It must be put across very clearly that this vulnerability in no way enables an attacker to gain full control of your website.  However, this exploit often accompanies another, more serious one in which this will aid an attacker in controlling your website.&lt;br /&gt;
&lt;br /&gt;
==External References==&lt;br /&gt;
*[http://www.enigmagroup.org/ Articled summarised from Full Path Disclosure article by haZed on EnigmaGroup.org]&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category:Attack]]&lt;/div&gt;</summary>
		<author><name>HaZed</name></author>	</entry>

	</feed>