header-logo
Suggest Exploit
vendor:
N/A
by:
nicx0
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Directory Traversal Attack

Directory traversal, also known as path traversal, is an HTTP attack which allows attackers to access restricted directories and execute commands outside of the web server's root directory. This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. It is used by attackers to gain access to files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations, or by using absolute file paths, attackers can access arbitrary files and directories stored on file system including application source code or configuration and critical system files. Directory traversal attacks can also be used to access restricted directories and execute commands outside of the web server's root directory.

Mitigation:

To prevent directory traversal attacks, web applications should not rely on the client for providing file or directory paths. All user-supplied input should be validated and filtered to prevent directory traversal attacks. Additionally, web applications should not allow users to upload files with executable extensions, such as .exe, .bat, .cmd, .php, .pl, etc.
Source

Exploit-DB raw data:

Directory Traversal Attack

Example:
http://XX.XX.XX.XX/..%2F..%2F..%2F..%2F..%2Fwindows/repair/sam
http://XX.XX.XX.XX/..%2F..%2F..%2F..%2F..%2Fboot.ini



-nicx0

# milw0rm.com [2008-12-19]