 
    
结构: Simple
Abstraction: Variant
状态: Incomplete
被利用可能性: unkown
The software contains protection mechanisms to restrict access to 'realdir/filename', but it constructs pathnames using external input in the form of 'fakedir/../realdir/filename' that are not handled by those mechanisms. This allows attackers to perform unauthorized actions against the targeted file.
cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 699 cwe_Ordinal: Primary
Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}
| 范围 | 影响 | 注释 | 
|---|---|---|
| ['Confidentiality', 'Integrity'] | ['Read Files or Directories', 'Modify Files or Directories'] | 
策略: Input Validation
Inputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass whitelist validation schemes by introducing dangerous inputs after they have been checked.
| 标识 | 说明 | 链接 | 
|---|---|---|
| CVE-2001-1152 | Proxy allows remote attackers to bypass blacklist restrictions and connect to unauthorized web servers by modifying the requested URL, including (1) a // (double slash), (2) a /SUBDIR/.. where the desired file is in the parentdir, (3) a /./, or (4) URL-encoded characters. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1152 | 
| CVE-2000-0191 | application check access for restricted URL before canonicalization | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0191 | 
| CVE-2005-1366 | CGI source disclosure using "dirname/../cgi-bin" | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1366 | 
| 映射的分类名 | ImNode ID | Fit | Mapped Node Name | 
|---|---|---|---|
| PLOVER | dirname/fakechild/../realchild/filename | ||
| Software Fault Patterns | SFP16 | Path Traversal |