This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Relative Path Traversal"
From OWASP
m (→Categories) |
Andrew Smith (talk | contribs) m |
||
(28 intermediate revisions by 6 users not shown) | |||
Line 1: | Line 1: | ||
+ | #REDIRECT [[Path Traversal]] | ||
{{Template:Attack}} | {{Template:Attack}} | ||
+ | <br> | ||
+ | [[Category:OWASP ASDR Project]] | ||
+ | |||
+ | |||
+ | Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' | ||
+ | |||
+ | |||
+ | ==Overview== | ||
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../". | This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../". | ||
+ | |||
+ | ==Related Security Activities== | ||
+ | |||
+ | ===How to Avoid Path Traversal Vulnerabilities=== | ||
+ | |||
+ | See the [[:Category:OWASP Guide Project|OWASP Guide]] article on how to [[File_System#Path_traversal|Avoid Path Traversal ]] Vulnerabilities. | ||
+ | |||
+ | |||
+ | ===How to Test for Path Traversal Vulnerabilities=== | ||
+ | |||
+ | See the [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for Path Traversal (OWASP-AZ-001) |Test for Path Traversal ]] Vulnerabilities. | ||
+ | |||
More detailed information can be found on [[Path_Traversal]] | More detailed information can be found on [[Path_Traversal]] | ||
+ | |||
+ | == Description== | ||
+ | TBD | ||
==Examples == | ==Examples == | ||
Line 19: | Line 43: | ||
<nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki> | <nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki> | ||
+ | ==Risk Factors== | ||
+ | TBD | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | ==Related [[Threat Agents]]== | ||
+ | * [[: Category: Information Disclosure]] | ||
+ | [[Category:FIXME|this link doesn't exist, add the category or change this link?]] | ||
− | ==Related | + | ==Related [[Attacks]]== |
− | [[ | + | * [[Path Manipulation]] |
+ | * [[ Path Traversal]] | ||
+ | * [[ Resource Injection]] | ||
+ | ==Related [[Vulnerabilities]]== | ||
+ | * [[:Category:Input Validation Vulnerability]] | ||
− | ==Related | + | ==Related [[Controls]]== |
− | [[:Category:Input Validation]] | + | * [[:Category:Input Validation]] |
+ | ==References== | ||
+ | TBD | ||
− | + | [[Category: Resource Manipulation]] | |
− | [[ |
Latest revision as of 19:54, 6 October 2015
Redirect to:
- This is an Attack. To view all attacks, please see the Attack Category page.
Last revision (mm/dd/yy): 10/6/2015
Overview
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".
Related Security Activities
How to Avoid Path Traversal Vulnerabilities
See the OWASP Guide article on how to Avoid Path Traversal Vulnerabilities.
How to Test for Path Traversal Vulnerabilities
See the OWASP Testing Guide article on how to Test for Path Traversal Vulnerabilities.
More detailed information can be found on Path_Traversal
Description
TBD
Examples
The following URLs are vulnerable to this attack:
http://some_site.com.br/get-files.jsp?file=report.pdf http://some_site.com.br/get-page.php?home=aaa.html http://some_site.com.br/some-page.asp?page=index.html
A simple way to execute this attack is like this:
http://some_site.com.br/get-files?file=../../../../some dir/some file http://some_site.com.br/../../../../etc/shadow http://some_site.com.br/get-files?file=../../../../etc/passwd
Risk Factors
TBD
Related Threat Agents
Related Attacks
Related Vulnerabilities
Related Controls
References
TBD