Difference between revisions of "Relative Path Traversal"

From OWASP
Jump to: navigation, search
(Categories)
(Reverting to last version not containing links to s1.shard.jp)
 
(28 intermediate revisions by 5 users not shown)
Line 1: Line 1:
 
{{Template:Attack}}
 
{{Template:Attack}}
  
 +
<br>
 +
[[Category:OWASP ASDR Project]]
 +
 +
 +
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 +
 +
 +
==Overview==
 
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".
 
This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".
 +
 +
==Related Security Activities==
 +
 +
===How to Avoid Path Traversal Vulnerabilities===
 +
 +
See the [[:Category:OWASP Guide Project|OWASP Guide]] article on how to [[File_System#Path_traversal|Avoid Path Traversal ]] Vulnerabilities.
 +
 +
 +
===How to Test for Path Traversal  Vulnerabilities===
 +
 +
See the [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for Path Traversal  (OWASP-AZ-001) |Test for Path Traversal ]] Vulnerabilities.
 +
  
 
More detailed information can be found on [[Path_Traversal]]
 
More detailed information can be found on [[Path_Traversal]]
 +
 +
== Description==
 +
TBD
  
 
==Examples ==
 
==Examples ==
Line 19: Line 42:
 
  <nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki>
 
  <nowiki> http://some_site.com.br/get-files?file=../../../../etc/passwd </nowiki>
  
 +
==Risk Factors==
 +
TBD
  
==Related Threats==
 
{{Template:Stub}}
 
 
[[: Category: Information Disclosure]]
 
 
 
==Related Attacks==
 
*[[Path Manipulation]]
 
*[[ Path Traversal]]
 
*[[ Resource Injection]]
 
  
 +
==Related [[Threat Agents]]==
 +
* [[: Category: Information Disclosure]]
 +
[[Category:FIXME|this link doesn't exist, add the category or change this link?]]
  
==Related Vulnerabilities==
+
==Related [[Attacks]]==
[[:Category:Input Validation Vulnerability]]
+
* [[Path Manipulation]]
 +
* [[ Path Traversal]]
 +
* [[ Resource Injection]]
  
 +
==Related [[Vulnerabilities]]==
 +
* [[:Category:Input Validation Vulnerability]]
  
==Related Countermeasures==
+
==Related [[Controls]]==
[[:Category:Input Validation]]
+
* [[:Category:Input Validation]]
  
 +
==References==
 +
TBD
  
==Categories==
+
[[Category: Resource Manipulation]]
{{Template:Stub}}
+
  
[[:Category: Resource Manipulation]]
+
[[Category: Attack]]

Latest revision as of 07:50, 3 June 2009

This is an Attack. To view all attacks, please see the Attack Category page.




Last revision (mm/dd/yy): 06/3/2009


Overview

This attack is a variant of Path Traversal and can be exploited when the application accepts the use of relative traversal sequences such as "../".

Related Security Activities

How to Avoid Path Traversal Vulnerabilities

See the OWASP Guide article on how to Avoid Path Traversal Vulnerabilities.


How to Test for Path Traversal Vulnerabilities

See the OWASP Testing Guide article on how to Test for Path Traversal Vulnerabilities.


More detailed information can be found on Path_Traversal

Description

TBD

Examples

The following URLs are vulnerable to this attack:

 http://some_site.com.br/get-files.jsp?file=report.pdf  
 http://some_site.com.br/get-page.php?home=aaa.html  
 http://some_site.com.br/some-page.asp?page=index.html  

A simple way to execute this attack is like this:

 http://some_site.com.br/get-files?file=../../../../some dir/some file  
 http://some_site.com.br/../../../../etc/shadow  
 http://some_site.com.br/get-files?file=../../../../etc/passwd 

Risk Factors

TBD


Related Threat Agents

Related Attacks

Related Vulnerabilities

Related Controls

References

TBD