目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-23 相对路径遍历 类漏洞列表 344

CWE-23 相对路径遍历 类弱点 344 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-23 相对路径遍历漏洞源于软件未正确过滤外部输入中的“..”序列,导致构造的文件路径突破受限目录边界。攻击者通常利用此缺陷读取或修改系统敏感文件,获取未授权访问权限。开发者应避免直接使用用户输入拼接路径,需通过白名单验证、规范化路径或限制访问范围来彻底中和危险字符,从而防止路径逃逸。

MITRE CWE 官方描述
CWE:CWE-23 Relative Path Traversal(相对路径遍历) 英文:产品使用外部输入来构建一个应位于受限目录内的路径名,但它未能正确中和(neutralize)诸如“..”之类的序列,这些序列可解析为该目录之外的位置。
常见影响 (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data by traversing the file system to access files or directories that are outside of the restricted directory. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mech…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the pr…
缓解措施 (3)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked. Use a built-in path canonicalization function (such as realpath(…
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
代码示例 (2)
The following URLs are vulnerable to this attack:
http://example.com/get-files.jsp?file=report.pdf http://example.com/get-page.php?home=aaa.html http://example.com/some-page.asp?page=index.html
Bad · Other
http://example.com/get-files?file=../../../../somedir/somefile http://example.com/../../../../etc/shadow http://example.com/get-files?file=../../../../etc/passwd
Attack · Other
The following code could be for a social networking application in which each user's profile information is stored in a separate file. All files are stored in a single directory.
my $dataPath = "/users/cwe/profiles"; my $username = param("user"); my $profilePath = $dataPath . "/" . $username; open(my $fh, "<", $profilePath) || ExitError("profile read error: $profilePath"); print "<ul>\n"; while (<$fh>) { print "<li>$_</li>\n"; } print "</ul>\n";
Bad · Perl
../../../etc/passwd
Attack
CVE ID标题CVSS风险等级Published
CVE-2026-43533 OpenClaw < 2026.4.10 QQBot媒体标签本地文件读取漏洞 — OpenClaw 8.6 High2026-05-05
CVE-2026-43616 Detect-It-Easy < 3.21 路径遍历任意文件写入漏洞 — DIE-engine 7.1 High2026-05-04
CVE-2026-42085 OpenC3 COSMOS插件目录任意写入漏洞 — cosmos 4.3 Medium2026-05-04
CVE-2026-22070 ColorOS Assistant 路径遍历漏洞 — ColorOS Assistant 7.1 High2026-04-30
CVE-2026-7404 MCPoSimpleServer 路径遍历漏洞 — mcpo-simple-server 7.3 High2026-04-29
CVE-2026-33733 EspoCRM 安全漏洞 — espocrm 7.2 High2026-04-22
CVE-2026-5966 TeamT5 ThreatSonar Anti-Ransomware 安全漏洞 — ThreatSonar Anti-Ransomware 8.1 High2026-04-20
CVE-2026-31927 Anviz CX7 安全漏洞 — Anviz CX7 Firmware 4.9 Medium2026-04-17
CVE-2026-33435 Weblate 安全漏洞 — weblate 8.1 High2026-04-15
CVE-2026-20081 Cisco Unity Connection 安全漏洞 — Cisco Unity Connection 6.5 Medium2026-04-15
CVE-2026-20078 Cisco Unity Connection(UC) 安全漏洞 — Cisco Unity Connection 6.5 Medium2026-04-15
CVE-2026-39814 Fortinet FortiWeb 安全漏洞 — FortiWeb 6.2 Medium2026-04-14
CVE-2026-27489 Open Neural Network Exchange(ONNX) 安全漏洞 — onnx 5.5AIMediumAI2026-04-01
CVE-2026-32725 scitokens 安全漏洞 — scitokens-cpp 8.3 High2026-03-31
CVE-2026-31831 Tautulli 安全漏洞 — Tautulli 7.5 -2026-03-30
CVE-2026-4415 GIGABYTE Control Center 安全漏洞 — Gigabyte Control Center 8.1 High2026-03-30
CVE-2026-33206 Calibre 安全漏洞 — calibre 9.8 -2026-03-27
CVE-2026-33494 Ory Oathkeeper 安全漏洞 — oathkeeper 10.0 Critical2026-03-26
CVE-2026-29101 SuiteCRM 安全漏洞 — SuiteCRM 4.9 Medium2026-03-19
CVE-2026-29098 SuiteCRM 安全漏洞 — SuiteCRM 4.9 Medium2026-03-19
CVE-2026-29778 pyLoad 安全漏洞 — pyload 7.1 High2026-03-07
CVE-2026-21659 Johnson Controls Frick Controls Quantum HD 安全漏洞 — Frick Controls Quantum HD 9.8 -2026-02-27
CVE-2025-62878 SUSE Rancher 安全漏洞 — Rancher 9.9 Critical2026-02-25
CVE-2026-27202 GetSimple CMS 安全漏洞 — GetSimpleCMS-CE 6.5AIMediumAI2026-02-20
CVE-2026-2818 Spring Data Geode 安全漏洞 — Spring Data Geode 8.2 High2026-02-20
CVE-2026-21620 Erlang/OTP 安全漏洞 — OTP 9.1AICriticalAI2026-02-20
CVE-2026-26362 Dell Unisphere for PowerMax 安全漏洞 — Unisphere for PowerMax 8.1 High2026-02-19
CVE-2025-58467 QNAP Qsync Central 安全漏洞 — Qsync Central 7.5AIHighAI2026-02-11
CVE-2026-1762 GE Vernova Enervista UR Setup 安全漏洞 — Enervista 2.9 Low2026-02-10
CVE-2026-25057 MarkUs 安全漏洞 — Markus 9.1 Critical2026-02-09

CWE-23(相对路径遍历) 是常见的弱点类别,本平台收录该类弱点关联的 344 条 CVE 漏洞。