This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Difference between revisions of "Relative Path Traversal"

Jump to: navigation, search
Line 3: Line 3:
[[Category:OWASP ASDR Project]]
[[Category:OWASP ASDR Project]]
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''

Revision as of 11:48, 23 April 2009

This is an Attack. To view all attacks, please see the Attack Category page.

Last revision (mm/dd/yy): 04/23/2009


This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".

Related Security Activities

How to Avoid Path Traversal Vulnerabilities

See the OWASP Guide article on how to Avoid Path Traversal Vulnerabilities.

How to Test for Path Traversal Vulnerabilities

See the OWASP Testing Guide article on how to Test for Path Traversal Vulnerabilities.

More detailed information can be found on Path_Traversal




The following URLs are vulnerable to this attack:  

A simple way to execute this attack is like this: dir/some file 

Risk Factors


Related Threat Agents

Related Attacks

Related Vulnerabilities

Related Controls