CWE-50 路径等价:'//multiple/leading/slash'

admin 2021年12月16日15:50:36评论53 views字数 2822阅读9分24秒阅读模式

CWE-50 路径等价:'//multiple/leading/slash'

Path Equivalence: '//multiple/leading/slash'

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown

基本描述

A software system that accepts path input in the form of multiple leading slash ('//multiple/leading/slash') without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 699 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 161 cwe_View_ID: 1000

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity'] ['Read Files or Directories', 'Modify Files or Directories']

分析过的案例

标识 说明 链接
CVE-2002-1483 Read files with full pathname using multiple internal slash. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1483
CVE-1999-1456 Server allows remote attackers to read arbitrary files via a GET request with more than one leading / (slash) character in the filename. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1456
CVE-2004-0578 Server allows remote attackers to read arbitrary files via leading slash (//) characters in a URL request. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0578
CVE-2002-0275 Server allows remote attackers to bypass authentication and read restricted files via an extra / (slash) in the requested URL. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0275
CVE-2004-1032 Product allows local users to delete arbitrary files or create arbitrary empty files via a target filename with a large number of leading slash (/) characters. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1032
CVE-2002-1238 Server allows remote attackers to bypass access restrictions for files via an HTTP request with a sequence of multiple / (slash) characters such as http://www.example.com///file/. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1238
CVE-2004-1878 Product allows remote attackers to bypass authentication, obtain sensitive information, or gain access via a direct request to admin/user.pl preceded by // (double leading slash). https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1878
CVE-2005-1365 Server allows remote attackers to execute arbitrary commands via a URL with multiple leading "/" (slash) characters and ".." sequences. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1365
CVE-2000-1050 Access directory using multiple leading slash. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1050
CVE-2001-1072 Bypass access restrictions via multiple leading slash, which causes a regular expression to fail. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1072
CVE-2004-0235 Archive extracts to arbitrary files using multiple leading slash in filenames in the archive. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0235

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER //multiple/leading/slash ('multiple leading slash')
Software Fault Patterns SFP16 Path Traversal

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日15:50:36
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-50 路径等价:'//multiple/leading/slash'https://cn-sec.com/archives/613240.html

发表评论

匿名网友 填写信息