Home / Vulnerability Database / Config files : Path manipulation
Config files
Config files : Path manipulation
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
HIPAA
Overview
While working with the file system, you should be careful, an attacker can get access to read and modify important system files because of insufficient validation of user data .
By manipulating path parameters by using ~, an attacker can work with files and directories that are not in the home directory path.
References
- OWASP Top 10 2017-A1-Injection
- OWASP Top 10 2017-A5-Broken Access Control
- OWASP Top 10 2013-A4-Insecure Direct Object References
- CWE-73: External Control of File Name or Path
- Path Traversal - OWASP
- CWE CATEGORY: OWASP Top Ten 2017 Category A1 - Injection
- CWE-23
- CWE-36
- Restrict path access to prevent path traversal
- A01:2021 - Broken Access Control
- CWE-35: Path Traversal
- A03:2021 - Injection
CRITICAL
DerScanner Severity Score
Do you want to fix Config files : Path manipulation in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
