目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CWE-22 对路径名的限制不恰当(路径遍历) 类漏洞列表 3501

CWE-22 对路径名的限制不恰当(路径遍历) 类弱点 3501 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-22 属于路径遍历漏洞,指程序未正确过滤外部输入中的特殊字符,导致构造的文件路径突破受限目录限制。攻击者常利用“../”等序列访问系统敏感文件,窃取数据或执行恶意操作。开发者应严格校验输入,使用白名单机制限制合法字符,并采用绝对路径或规范化处理,确保最终解析路径始终位于预期目录内,从而有效防御此类风险。

MITRE CWE 官方描述
CWE:CWE-22 对受限目录的路径名限制不当('Path Traversal') 英文:产品使用外部输入来构造一个路径名,该路径名旨在标识位于受限父目录下的文件或目录,但产品未能正确中和路径名中可能导致路径名解析到受限目录之外位置的特殊元素。 许多文件操作旨在在受限目录内进行。通过使用“..”和“/”分隔符等特殊元素,攻击者可以逃逸出受限位置,以访问系统中其他位置的文件或目录。最常见的特殊元素之一是“../”序列,在大多数现代操作系统中,它被解释为当前位置的父目录。这被称为相对路径遍历(relative path traversal)。路径遍历(Path Traversal)也涵盖使用绝对路径名(如“/usr/local/bin”)来访问意外文件的情况。这被称为绝对路径遍历(absolute path traversal)。
常见影响 (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing a…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of protection mechanisms such as authentication, it has the potential to lock out product users.
缓解措施 (5)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked. Use a built-in path canonicalization function (such as realpath(…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
代码示例 (2)
The following code could be for a social networking application in which each user's profile information is stored in a separate file. All files are stored in a single directory.
my $dataPath = "/users/cwe/profiles"; my $username = param("user"); my $profilePath = $dataPath . "/" . $username; open(my $fh, "<", $profilePath) || ExitError("profile read error: $profilePath"); print "<ul>\n"; while (<$fh>) { print "<li>$_</li>\n"; } print "</ul>\n";
Bad · Perl
../../../etc/passwd
Attack
In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.
String filename = System.getProperty("com.domain.application.dictionaryFile"); File dictionaryFile = new File(filename);
Bad · Java
CVE ID标题CVSS风险等级Published
CVE-2022-31159 Amazon AWS SDK for Java 路径遍历漏洞 — aws-sdk-java 7.9 High2022-07-15
CVE-2022-34762 多款Schneider Electric产品路径遍历漏洞 — OPC UA Modicon Communication Module 5.9 Medium2022-07-13
CVE-2017-20105 Simplessus 路径遍历漏洞 — Simplessus 5.4 Medium2022-06-28
CVE-2017-20102 Album Lock 路径遍历漏洞 — Album Lock 4.4 Medium2022-06-27
CVE-2022-1953 WordPress plugin WooCommerce 路径遍历漏洞 — Product Configurator for WooCommerce 9.1 -2022-06-27
CVE-2022-2119 OFFIS DCMTK 路径遍历漏洞 — DCMTK 7.5 High2022-06-24
CVE-2013-1891 OpenCart 路径遍历漏洞 — opencart 9.1 -2022-06-24
CVE-2022-1518 Illumina Local Run Manager 路径遍历漏洞 — NextSeq 550Dx 10.0 Critical2022-06-24
CVE-2022-30117 PortlandLabs Concrete CMS 路径遍历漏洞 — https://github.com/concrete5/concrete5 9.1 -2022-06-24
CVE-2022-31062 GLPI Inventory Plugin 路径遍历漏洞 — glpi-inventory-plugin 5.3 Medium2022-06-20
CVE-2022-1657 JupiterX Theme 路径遍历漏洞 — Jupiter 8.8 High2022-06-13
CVE-2022-29094 Dell SupportAssist Client 路径遍历漏洞 — SupportAssist Client Consumer 7.1 High2022-06-10
CVE-2022-29093 Dell SupportAssist Client 路径遍历漏洞 — SupportAssist Client Commercial 7.1 High2022-06-10
CVE-2021-42811 SafeNet KeySecure Management 路径遍历漏洞 — SafeNet KeySecure 3.3 Low2022-06-10
CVE-2022-1993 Gogs 路径遍历漏洞 — gogs/gogs 7.5 -2022-06-08
CVE-2022-1992 Gogs 路径遍历漏洞 — gogs/gogs 7.5 -2022-06-08
CVE-2022-24840 django-s3file 路径遍历漏洞 — django-s3file 9.1 Critical2022-06-06
CVE-2022-31483 Carrier LenelS2 HID Mercury access panels 路径遍历漏洞 — LNL-X2210 9.1 Critical2022-06-06
CVE-2022-0779 WordPress plugin User Meta Manager 路径遍历漏洞 — User Meta – User Profile Builder and User management plugin 6.5 -2022-06-06
CVE-2022-23082 WhiteSource CureKit 路径遍历漏洞 — CureKit 7.5 High2022-05-31
CVE-2022-1850 filegator 路径遍历漏洞 — filegator/filegator 8.1 -2022-05-24
CVE-2022-1721 JGraph draw.io 路径遍历漏洞 — jgraph/drawio 7.5 -2022-05-16
CVE-2022-1560 WordPress plugin Amministrazione Aperta 路径遍历漏洞 — Amministrazione Aperta 8.1 -2022-05-16
CVE-2022-24830 OpenClinica 路径遍历漏洞 — OpenClinica 6.5 Medium2022-05-13
CVE-2021-33005 mySCADA myPRO 路径遍历漏洞 — myPRO 7.5 High2022-05-13
CVE-2022-1476 WordPress plugin All-in-One WP Migration 路径遍历漏洞 — All-in-One WP Migration and Backup 6.6 Medium2022-05-10
CVE-2022-24878 Flux2 路径遍历漏洞 — flux2 7.7 High2022-05-06
CVE-2022-24877 Flux2 路径遍历漏洞 — flux2 9.9 Critical2022-05-06
CVE-2021-38693 QNAP 多款产品路径遍历漏洞 — QuTScloud 5.3 Medium2022-05-05
CVE-2022-29474 F5 BIG-IP 路径遍历漏洞 — BIG-IP 4.3 Medium2022-05-05

CWE-22(对路径名的限制不恰当(路径遍历)) 是常见的弱点类别,本平台收录该类弱点关联的 3501 条 CVE 漏洞。