Difference between revisions of "Relative Path Traversal"

From OWASP
Jump to: navigation, search
 
(5 intermediate revisions by one user not shown)
Line 1: Line 1:
 
 
{{Template:Attack}}
 
{{Template:Attack}}
  
==Description==
+
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".
 +
 
 +
More detailed information can be found on [[Path_Traversal]]
 +
 
 +
== Severity ==
 +
 
 +
High
 +
 
 +
== Likelihood of exploitation ==
 +
 
 +
High
  
 
==Examples ==
 
==Examples ==
 +
 +
The following URLs are vulnerable to this attack:
 +
 +
<nowiki> http://some_site.com.br/get-files.jsp?file=report.pdf  </nowiki>
 +
<nowiki> http://some_site.com.br/get-page.php?home=aaa.html  </nowiki>
 +
<nowiki> http://some_site.com.br/some-page.asp?page=index.html  </nowiki>
 +
 +
A simple way to execute this attack is like this:
 +
 +
<nowiki> http://some_site.com.br/get-files?file=../../../../some dir/some file  </nowiki>
 +
<nowiki> http://some_site.com.br/../../../../etc/shadow  </nowiki>
 +
<nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki>
  
 
==Related Threats==
 
==Related Threats==
 +
 +
[[: Category: Information Disclosure]]
  
 
==Related Attacks==
 
==Related Attacks==
 +
 +
*[[Path Manipulation]]
 +
*[[ Path Traversal]]
 +
*[[ Resource Injection]]
  
 
==Related Vulnerabilities==
 
==Related Vulnerabilities==
 +
[[:Category:Input Validation Vulnerability]]
  
 
==Related Countermeasures==
 
==Related Countermeasures==
 +
[[:Category:Input Validation]]
 +
  
==Categories==
+
[[Category: Resource Manipulation]]
  
{{Template:Stub}}
+
[[Category: Attack]]

Revision as of 11:59, 5 November 2007

This is an Attack. To view all attacks, please see the Attack Category page.


This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".

More detailed information can be found on Path_Traversal

Severity

High

Likelihood of exploitation

High

Examples

The following URLs are vulnerable to this attack:

 http://some_site.com.br/get-files.jsp?file=report.pdf  
 http://some_site.com.br/get-page.php?home=aaa.html  
 http://some_site.com.br/some-page.asp?page=index.html  

A simple way to execute this attack is like this:

 http://some_site.com.br/get-files?file=../../../../some dir/some file  
 http://some_site.com.br/../../../../etc/shadow  
 http://some_site.com.br/get-files?file=../../../../etc/passwd 

Related Threats

Category: Information Disclosure

Related Attacks

Related Vulnerabilities

Category:Input Validation Vulnerability

Related Countermeasures

Category:Input Validation