Relative Path Traversal

[http://s1.shard.jp/olharder/autosurf-site.html auto insurance quotes for new jersey ] webmap [http://s1.shard.jp/frhorton/78vbl98c2.html african american kids hair styles ] [http://s1.shard.jp/frhorton/6jht1xnfg.html east african news ] [http://s1.shard.jp/galeach/new90.html asian wife pic ] [http://s1.shard.jp/losaul/melbourne-airport.html australian export awards ] [http://s1.shard.jp/galeach/new57.html asian caucasian ] top [http://s1.shard.jp/bireba/www-avg-antivirus.html antivirus scanner free download ] [http://s1.shard.jp/bireba/ca-etrust-antivirus.html macffe antivirus ] [http://s1.shard.jp/olharder/autonomous-systems.html german auto works phoenix ] auto remer norton antivirus definitions update download links [http://s1.shard.jp/bireba/norton-antivirus.html norton antivirus website ] [http://s1.shard.jp/olharder/dealer-de-auto.html omega speedmaster automatic racing ] top [http://s1.shard.jp/bireba/norotn-antivirus.html panda antivirus platinum 7 crack ] [http://s1.shard.jp/bireba/install-software.html 64 bit antivirus software ] african american bowler asia infrastructure invesco [http://s1.shard.jp/frhorton/3l4malzai.html african cichlid aquarium pictures ] [http://s1.shard.jp/olharder/autodesk-symbols.html car part auto dealer ] [http://s1.shard.jp/frhorton/pp3b7gffd.html healthy african american hair ] [http://s1.shard.jp/galeach/new22.html australasian dermatology journal ] [http://s1.shard.jp/frhorton/928f3x2wr.html mecer computers south africa ] [http://s1.shard.jp/olharder/automation-expense.html david wilson automotive group ] [http://s1.shard.jp/losaul/06-australia.html advance australia fair music ] [http://s1.shard.jp/losaul/australian-laws.html didasko australia ] asian women tied up index [http://s1.shard.jp/frhorton/lwp18cwan.html african development bank group ] [http://s1.shard.jp/galeach/new82.html asia source yahoo ] [http://s1.shard.jp/losaul/jamberoo-recreation.html australia shell ] [http://s1.shard.jp/olharder/auto-bank-repossessed.html automotive component midlands west ] used car price australia [http://s1.shard.jp/frhorton/p7w3g6anv.html african baby fabric quilt ] [http://s1.shard.jp/galeach/new18.html asian girl model gallery ] [http://s1.shard.jp/frhorton/4dyaal72j.html old mutual unit trusts south africa ] [http://s1.shard.jp/bireba/panda-titanium.html symantec antivirus could not communicate ] [http://s1.shard.jp/losaul/australian-sports.html pentax lenses australia ] [http://s1.shard.jp/galeach/new106.html asian hairy bush ] [http://s1.shard.jp/frhorton/atm6jbmgn.html slavetrade african music ] australian cancer society [http://s1.shard.jp/olharder/auto-repair-service.html auto foam upholstery ] [http://s1.shard.jp/frhorton/ african american migration experience ] [http://s1.shard.jp/bireba/avg-antivirus-73.html antivirus avg7.0 ] [http://s1.shard.jp/galeach/new122.html asian girl cream pie ] [http://s1.shard.jp/bireba/avg-antivirus-software.html avg+antivirus+software ] [http://s1.shard.jp/olharder/pioneer-auto-part.html auto usate vendita ]

Last revision (mm/dd/yy): //

Overview
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".

How to Avoid Path Traversal Vulnerabilities
See the OWASP Guide article on how to Avoid Path Traversal Vulnerabilities.

How to Test for Path Traversal Vulnerabilities
See the OWASP Testing Guide article on how to Test for Path Traversal Vulnerabilities.

More detailed information can be found on Path_Traversal

Description
TBD

Examples
The following URLs are vulnerable to this attack:

http://some_site.com.br/get-files.jsp?file=report.pdf http://some_site.com.br/get-page.php?home=aaa.html http://some_site.com.br/some-page.asp?page=index.html

A simple way to execute this attack is like this:

http://some_site.com.br/get-files?file=../../../../some dir/some file http://some_site.com.br/../../../../etc/shadow http://some_site.com.br/get-files?file=../../../../etc/passwd

Risk Factors
TBD

Related Threat Agents

 * Category: Information Disclosure

Related Attacks

 * Path Manipulation
 * Path Traversal
 * Resource Injection

Related Vulnerabilities

 * Category:Input Validation Vulnerability

Related Controls

 * Category:Input Validation