Scope | Impact | Likelihood |
---|---|---|
Integrity Confidentiality Availability | Execute Unauthorized Code or Commands Note: The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries. | |
Integrity | Modify Files or Directories Note: The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow an attacker to bypass authentication. | |
Confidentiality | Read Files or Directories Note: The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing attacks in order to break into an account on the system. | |
Availability | DoS: Crash, Exit, or Restart Note: The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the product. |
References | Description |
---|---|
CVE-2022-31503 | Python package constructs filenames using an unsafe os.path.join call on untrusted input, allowing absolute path traversal because os.path.join resets the pathname to an absolute path that is specified as part of the input. |
CVE-2002-1345 | Multiple FTP clients write arbitrary files via absolute paths in server responses |
CVE-2001-1269 | ZIP file extractor allows full path |
CVE-2002-1818 | Path traversal using absolute pathname |
CVE-2002-1913 | Path traversal using absolute pathname |
CVE-2005-2147 | Path traversal using absolute pathname |
CVE-2000-0614 | Arbitrary files may be overwritten via compressed attachments that specify absolute path names for the decompressed output. |
CVE-1999-1263 | Mail client allows remote attackers to overwrite arbitrary files via an e-mail message containing a uuencoded attachment that specifies the full pathname for the file to be modified. |
CVE-2003-0753 | Remote attackers can read arbitrary files via a full pathname to the target file in config parameter. |
CVE-2002-1525 | Remote attackers can read arbitrary files via an absolute pathname. |
CVE-2001-0038 | Remote attackers can read arbitrary files by specifying the drive letter in the requested URL. |
CVE-2001-0255 | FTP server allows remote attackers to list arbitrary directories by using the "ls" command and including the drive letter name (e.g. C:) in the requested pathname. |
CVE-2001-0933 | FTP server allows remote attackers to list the contents of arbitrary drives via a ls command that includes the drive letter as an argument. |
CVE-2002-0466 | Server allows remote attackers to browse arbitrary directories via a full pathname in the arguments to certain dynamic pages. |
CVE-2002-1483 | Remote attackers can read arbitrary files via an HTTP request whose argument is a filename of the form "C:" (Drive letter), "//absolute/path", or ".." . |
CVE-2004-2488 | FTP server read/access arbitrary files using "C:\" filenames |
CVE-2001-0687 | FTP server allows a remote attacker to retrieve privileged web server system information by specifying arbitrary paths in the UNC format (\\computername\sharename). |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-597 | Absolute Path Traversal An adversary with access to file system resources, either directly or via application logic, will use various file absolute paths and navigation mechanisms such as ".." to extend their range of access to inappropriate areas of the file system. The goal of the adversary is to access directories and files that are intended to be restricted from their access. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Sean Eidemiller | Cigital | added/updated demonstrative examples | |
Eric Dalci | Cigital | updated Time_of_Introduction | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Description | |
CWE Content Team | MITRE | updated Common_Consequences, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Common_Consequences, Demonstrative_Examples, Observed_Examples, References, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Applicable_Platforms | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Common_Consequences, Description | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Detection_Factors, Relationships, Time_of_Introduction | |
CWE Content Team | MITRE | updated Mapping_Notes | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated Demonstrative_Examples |