Home / Vulnerability Database / Kotlin : Path manipulation
Kotlin
Kotlin : Path manipulation
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
OWASP ASVS
PCI DSS 4.0
HIPAA
Overview
Using data from an untrusted source when working with the file system may give an attacker access to important system files.
By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.
References
- OWASP Top 10 2017-A1-Injection
- OWASP Top 10 2017-A5-Broken Access Control
- OWASP Top 10 2013-A4-Insecure Direct Object References
- CWE-73: External Control of File Name or Path
- Path Traversal - OWASP
- CWE CATEGORY: OWASP Top Ten 2017 Category A1 - Injection
- CWE-23
- CWE-36
- Restrict path access to prevent path traversal
- A01:2021 - Broken Access Control
- CWE-35: Path Traversal
- A03:2021 - Injection
CRITICAL
DerScanner Severity Score
Do you want to fix Kotlin : Path manipulation in your application?
See also
Kotlin
Kotlin : Missing required cryptographic step
Kotlin
Kotlin : Logging into system output
Kotlin
