Difference between revisions of "Directory Restriction Error"

From OWASP
Jump to: navigation, search
m (Directory Restriction moved to Directory Restriction Error: Changed the title to be a vulnerability.)
(Description)
Line 3: Line 3:
 
==Description==
 
==Description==
  
Improper use of the chroot() system call may allow attackers to access files that are outside the new root directory therefore breaks the intended access control policy.  
+
The application fails to enforce the intended restricted directory access policy. By using relative paths or other path traversal attack mechanisms, an attacker can access unauthorized files outside the restricted directory. Examples:
 +
* Improper use of the chroot() system call may allow attackers to access files that are outside the new root directory therefore breaks the intended access control policy.
  
 
==Related Threats==
 
==Related Threats==

Revision as of 10:52, 9 June 2006

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Description

The application fails to enforce the intended restricted directory access policy. By using relative paths or other path traversal attack mechanisms, an attacker can access unauthorized files outside the restricted directory. Examples:

  • Improper use of the chroot() system call may allow attackers to access files that are outside the new root directory therefore breaks the intended access control policy.

Related Threats

Attackers try to access unauthorized files, such as password files or configuration files.

Related Attacks

Path Traversal Attacks

Related Countermeasures

Input Validation

Access Control

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.