Home / Vulnerability Database / Config files : Path manipulation
Config files

Config files : Path manipulation

Overview

While working with the file system, you should be careful, an attacker can get access to read and modify important system files because of insufficient validation of user data .

By manipulating path parameters by using ~, an attacker can work with files and directories that are not in the home directory path.

CRITICAL

DerScanner Severity Score

Do you want to fix Config files : Path manipulation in your application?

See also

Config files

Config files : Text4Shell Vulnerability

Config files

Config files : Incorrect directory deletion

Config files

Config files : Code injection