CWE

普遍的弱点

社区开发的软件和硬件弱点类型清单

2021 CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
>CWE列表> cwe-单个字典定义(4.10)
ID

CWE-36:绝对路径遍历

Weakness ID: 36
抽象:根据
Structure:Simple
查看自定义信息:
+描述
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
+扩展描述
这使攻击者可以遍历文件系统以访问限制目录之外的文件或目录。
+关系
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与观点“研究概念”相关(CWE-1000)
Nature 类型 ID Name
ChildOf 根据基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 22 路径名的不当限制到限制目录(“路径遍历”)
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 37 路径遍历:'/absolute/pathname/there'
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 38 Path Traversal: '\absolute\pathname\here'
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 39 Path Traversal: 'C:dirname'
父母 变体变体- a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. 40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与“软件开发”视图相关(CWE-699)
Nature 类型 ID Name
成员 类别类别 - 包含共享共同特征的其他条目的CWE条目。 1219 File Handling Issues
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+与“ CISQ质量措施(2020)”相关(CWE-1305)
Nature 类型 ID Name
ChildOf 根据基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 22 路径名的不当限制到限制目录(“路径遍历”)
部分帮助This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+Relevant to the view "CISQ Data Protection Measures" (CWE-1340)
Nature 类型 ID Name
ChildOf 根据基础 - 仍然主要独立于资源或技术的弱点,但有足够的细节来提供特定的检测和预防方法。基本水平的弱点通常用以下维度的2或3来描述问题:行为,财产,技术,语言和资源。 22 路径名的不当限制到限制目录(“路径遍历”)
+Modes Of Introduction
部分帮助The different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
阶段 Note
建筑和设计
执行
+Applicable Platforms
部分帮助This listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.

Languages

班级:不是特定语言的(不确定的患病率)

+Common Consequences
部分帮助This table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
范围 影响 Likelihood
正直
保密
可用性

Technical Impact:执行未经授权的代码或命令

攻击者可能能够创建或覆盖用于执行代码的关键文件,例如程序或库。
正直

Technical Impact:修改文件或目录

攻击者可能能够覆盖或创建关键文件,例如程序,库或重要数据。如果目标文件用于安全机制,则攻击者可能能够绕过该机制。例如,在密码文件末尾附加一个新帐户可以允许攻击者绕过身份验证。
保密

Technical Impact:Read Files or Directories

攻击者可能能够阅读意外文件的内容并揭示敏感数据。如果目标文件用于安全机制,则攻击者可能能够绕过该机制。例如,通过读取密码文件,攻击者可以进行蛮力密码猜测攻击,以分解系统上的帐户。
可用性

Technical Impact:DoS: Crash, Exit, or Restart

The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the product.
+示例的例子

示例1

In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.

(不良代码)
示例语言:Java
String filename = System.getProperty("com.domain.application.dictionaryFile");
文件dictionaryfile = new文件(文件名);

但是,该路径未经验证或修改,以防止其在创建文件对象之前包含相对或绝对路径序列。这使任何可以控制系统属性的人都可以确定使用了哪些文件。理想情况下,应相对于某种应用程序或用户主目录的路径解决。

+观察到的例子
参考 描述
Python package constructs filenames using an unsafe os.path.join call on untrusted input, allowing absolute path traversal because os.path.join resets the pathname to an absolute path that is specified as part of the input.
Multiple FTP clients write arbitrary files via absolute paths in server responses
ZIP file extractor allows full path
Path traversal using absolute pathname
Path traversal using absolute pathname
Path traversal using absolute pathname
Arbitrary files may be overwritten via compressed attachments that specify absolute path names for the decompressed output.
邮件客户端允许远程攻击者通过包含uuencoded附件的电子邮件覆盖任意文件,该电子邮件指定要修改文件的完整路径名。
远程攻击者可以通过完整的路径名读取任意文件,以在配置参数中的目标文件中读取。
远程攻击者可以通过绝对路径名读取任意文件。
远程攻击者可以通过在请求的URL中指定驱动器字母来读取任意文件。
FTP服务器允许远程攻击者使用“ LS”命令列出任意目录,并包括驱动器字母名称(例如C :)在请求的路径名中。
FTP服务器允许远程攻击者通过包含驱动器字母作为参数的LS命令列出任意驱动器的内容。
Server allows remote attackers to browse arbitrary directories via a full pathname in the arguments to certain dynamic pages.
远程攻击者可以通过HTTP请求读取任意文件,该请求的参数是“ c:”(驱动器字母),“ // absolute/path”或“ ..”的表单的文件名。
FTP server read/access arbitrary files using "C:\" filenames
FTP服务器允许远程攻击者通过指定UNC格式(\\ Computername \ Sharename)的任意路径来检索特权Web服务器系统信息。
+会员资格
部分帮助此成员关系表显示了其他CWE类别和视图,将此弱点称为成员。该信息通常可用于理解弱点适合外部信息源的何处。
Nature 类型 ID Name
成员 看法看法- a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries). 884 CWE横截面
成员 类别类别 - 包含共享共同特征的其他条目的CWE条目。 981 SFP Secondary Cluster: Path Traversal
+分类映射
映射的分类名称 节点ID 合身 映射的节点名称
PLOVER 绝对路径遍历
Software Fault Patterns SFP16 Path Traversal
+参考
[Ref-62] Mark Dowd,John McDonald和Justin Schuh。“软件安全评估的艺术”。第9章,“文件名和路径”,第503页。第一版。艾迪生·卫斯理。2006。
+Content History
+提交
提交日期 提交者 组织
2006-07-19 PLOVER
+Modifications
Modification Date 修饰符 组织
2008-07-01 Sean Eidemiller 雪茄
added/updated demonstrative examples
2008-07-01 Eric Dalci 雪茄
updated Time_of_Introduction
2008-09-08 CWE内容团队 MITRE
更新的关系,分类_mappings
2008-10-14 CWE内容团队 MITRE
updated Description
2010-02-16 CWE内容团队 MITRE
更新了示范_examples
2010-06-21 CWE内容团队 MITRE
更新的示范_examples,描述
2011-06-01 CWE内容团队 MITRE
更新的common_conconquence,关系,分类_mappings
2011-09-13 CWE内容团队 MITRE
更新的关系,分类_mappings
2012-05-11 CWE内容团队 MITRE
更新的common_ccessquences,示例_examples,obsoved_examples,参考,关系
2012-10-30 CWE内容团队 MITRE
更新的势_MINEIGATIONS
2014-07-30 CWE内容团队 MITRE
更新的关系,分类_mappings
2017-01-19 CWE内容团队 MITRE
updated Related_Attack_Patterns
2017-11-08 CWE内容团队 MITRE
更新了适用的_platforms
2020-02-24 CWE内容团队 MITRE
更新的关系
2020-08-20 CWE内容团队 MITRE
更新的关系
2020-12-10 CWE内容团队 MITRE
更新的关系
2021-03-15 CWE内容团队 MITRE
更新了示范_examples
2022-10-13 CWE内容团队 MITRE
updated Observed_Examples
2023-01-31 CWE内容团队 MITRE
更新的common_cconsquences,说明
提供更多信息 - 请选择其他过滤器。
Page Last Updated:January 31, 2023