<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jakub+Vr%C3%A1na</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jakub+Vr%C3%A1na"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jakub_Vr%C3%A1na"/>
		<updated>2026-04-06T14:36:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Full_Path_Disclosure&amp;diff=116407</id>
		<title>Full Path Disclosure</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Full_Path_Disclosure&amp;diff=116407"/>
				<updated>2011-08-29T12:50:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jakub Vrána: Promote display_errors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Attack}}&lt;br /&gt;
&lt;br /&gt;
Last revision: '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file.  e.g.: /home/omg/htdocs/file/. &lt;br /&gt;
Certain vulnerabilities, such as using the load_file() (within a [[SQL Injection]]) query to view the page source, require the attacker to have the full path to the file they wish to view.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
'''Empty Array'''&lt;br /&gt;
&lt;br /&gt;
If we have a site that uses a method of requesting a page like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://site.com/index.php?page=about&amp;lt;/pre&amp;gt;&lt;br /&gt;
We can use a method of opening and closing braces that causes the page to output an error.  This method would look like this:&lt;br /&gt;
&amp;lt;pre&amp;gt;http://site.com/index.php?page[]=about&amp;lt;/pre&amp;gt;&lt;br /&gt;
This renders the page defunct thus spitting out an error:&lt;br /&gt;
&amp;lt;pre&amp;gt;Warning: opendir(Array): failed to open dir: No such file or directory in /home/omg/htdocs/index.php on line 84&lt;br /&gt;
Warning: pg_num_rows(): supplied argument ... in /usr/home/example/html/pie/index.php on line 131&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Null Session Cookie'''&lt;br /&gt;
&lt;br /&gt;
Another popular and very reliable method of producing errors containing a FPD is to give the page a nulled session using Javascript Injections.&lt;br /&gt;
A simple injection using this method would look something like so:&lt;br /&gt;
&amp;lt;pre&amp;gt;javascript:void(document.cookie=&amp;quot;PHPSESSID=&amp;quot;);&amp;lt;/pre&amp;gt;&lt;br /&gt;
By simply setting the PHPSESSID cookie to nothing (null) we get an error.&lt;br /&gt;
&amp;lt;pre&amp;gt;Warning: session_start() [function.session-start]: The session id contains illegal characters, &lt;br /&gt;
valid characters are a-z, A-Z, 0-9 and '-,' in /home/example/public_html/includes/functions.php on line 2&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This vulnerability is prevented simply by turning error reporting off so your code does not spit out errors.&lt;br /&gt;
&amp;lt;pre&amp;gt;error_reporting(0);&amp;lt;/pre&amp;gt;&lt;br /&gt;
Errors can contain useful information for site owner so instead of disabling the error reporting at all, it is possible to only hide errors from output by [http://www.php.net/errorfunc.configuration#ini.display-errors display_errors].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Direct Access to files that requires preloaded library files'''&lt;br /&gt;
&lt;br /&gt;
Web application developers sometimes fail to add safe checks in files that requires preloaded library/function files.&lt;br /&gt;
This is prone to reveal possible sensitive information when those applications' URLs are directly requested. Sometimes, it's a clue to Local File Inclusion vulnerability.  &lt;br /&gt;
&lt;br /&gt;
Concerning with Mambo CMS, if we access to a direct url, http://site.com/mambo/mambots/editors/mostlyce/jscripts/tiny_mce/plugins/spellchecker/classes/PSpellShell.php, then we gets &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Fatal error&amp;lt;/b&amp;gt;:  Class 'SpellChecker' not found in &amp;lt;b&amp;gt;/home/victim/public_html/mambo/mambots/editors/mostlyce/jscripts/tiny_mce/plugins/spellchecker/classes/PSpellShell.php&amp;lt;/b&amp;gt; on line &amp;lt;b&amp;gt;9&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Tool==&lt;br /&gt;
&lt;br /&gt;
The above three checks can be done with the aid of [https://code.google.com/p/inspathx/ inspathx] tool.&lt;br /&gt;
&lt;br /&gt;
==Related [[Threat Agents]]==&lt;br /&gt;
* [[internal software developer]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
* [[SQL Injection]]&lt;br /&gt;
* [[Relative Path Traversal]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
* None&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
* [[Error Handling]]&lt;br /&gt;
* [[Bounds Checking]]&lt;br /&gt;
* [[Safe Libraries]]&lt;br /&gt;
* [[Static Code Analysis]]&lt;br /&gt;
* [[Executable space protection]]&lt;br /&gt;
* [[Address space layout randomization (ASLR)]]&lt;br /&gt;
* [[Stack-smashing Protection (SSP)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
* http://www.acunetix.com/vulnerabilities/Full-path-disclosure.htm&lt;br /&gt;
* [http://www.enigmagroup.org/ Articled summarised from Full Path Disclosure article by haZed on EnigmaGroup.org.]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/view.php/path_disclosure_vulnerability.txt Path Disclosure Vulnerability - Is it serious?]&lt;br /&gt;
* [http://yehg.net/lab/pr0js/files.php/inspath.zip inspathx - Internal Path Disclosure Finder]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Injection]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jakub Vrána</name></author>	</entry>

	</feed>