目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-23 相对路径遍历 类漏洞列表 345

CWE-23 相对路径遍历 类弱点 345 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-23 相对路径遍历漏洞源于软件未正确过滤外部输入中的“..”序列,导致构造的文件路径突破受限目录边界。攻击者通常利用此缺陷读取或修改系统敏感文件,获取未授权访问权限。开发者应避免直接使用用户输入拼接路径,需通过白名单验证、规范化路径或限制访问范围来彻底中和危险字符,从而防止路径逃逸。

MITRE CWE 官方描述
CWE:CWE-23 Relative Path Traversal(相对路径遍历) 英文:产品使用外部输入来构建一个应位于受限目录内的路径名,但它未能正确中和(neutralize)诸如“..”之类的序列,这些序列可解析为该目录之外的位置。
常见影响 (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data by traversing the file system to access files or directories that are outside of the restricted directory. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mech…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the pr…
缓解措施 (3)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked. Use a built-in path canonicalization function (such as realpath(…
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
代码示例 (2)
The following URLs are vulnerable to this attack:
http://example.com/get-files.jsp?file=report.pdf http://example.com/get-page.php?home=aaa.html http://example.com/some-page.asp?page=index.html
Bad · Other
http://example.com/get-files?file=../../../../somedir/somefile http://example.com/../../../../etc/shadow http://example.com/get-files?file=../../../../etc/passwd
Attack · Other
The following code could be for a social networking application in which each user's profile information is stored in a separate file. All files are stored in a single directory.
my $dataPath = "/users/cwe/profiles"; my $username = param("user"); my $profilePath = $dataPath . "/" . $username; open(my $fh, "<", $profilePath) || ExitError("profile read error: $profilePath"); print "<ul>\n"; while (<$fh>) { print "<li>$_</li>\n"; } print "</ul>\n";
Bad · Perl
../../../etc/passwd
Attack
CVE ID标题CVSS风险等级Published
CVE-2023-3940 ZkTeco OEM 路径遍历漏洞 — ZkTeco-based OEM devices with firmware ZAM170-NF-1.8.25-7354-Ver1.0.0 7.5 High2024-05-21
CVE-2024-33615 Cyber Power Systems PowerPanel Business Edition 安全漏洞 — PowerPanel business 8.8 High2024-05-15
CVE-2024-30010 Microsoft Windows Hyper-V 安全漏洞 — Windows Server 2019 8.8 High2024-05-14
CVE-2024-34712 Oceanic 安全漏洞 — Oceanic 6.5 Medium2024-05-14
CVE-2024-0549 AnythingLLM 路径遍历漏洞 — mintplex-labs/anything-llm 8.1 -2024-04-16
CVE-2024-32005 NiceGUI 安全漏洞 — nicegui 8.2 High2024-04-12
CVE-2024-3025 AnythingLLM 安全漏洞 — mintplex-labs/anything-llm 9.1AICriticalAI2024-04-10
CVE-2024-0335 部分ABB产品 输入验证错误漏洞 — Symphony Plus S+ Operations 7.5 High2024-04-03
CVE-2024-20352 Cisco Emergency Responder 安全漏洞 — Cisco Emergency Responder 4.9 Medium2024-04-03
CVE-2024-20310 Cisco Unified Communications Manager 安全漏洞 — Cisco IOS XE Software 6.1 Medium2024-04-03
CVE-2024-25944 Dell OpenManage Enterprise 安全漏洞 — Dell OpenManage Enterprise 5.7 Medium2024-03-29
CVE-2024-24578 RaspberryMatic 安全漏洞 — RaspberryMatic 10.0 Critical2024-03-18
CVE-2024-27770 Unitronics Unistream Unilogic 安全漏洞 — Unistream Unilogic 8.8 High2024-03-18
CVE-2023-6825 WordPress Plugin File Manager And File Manager Pro 安全漏洞 — File Manager 9.9 Critical2024-03-13
CVE-2024-2053 Artica Proxy 安全漏洞 — Artica Proxy 9.8AICriticalAI2024-03-05
CVE-2024-27199 JetBrains TeamCity 安全漏洞 — TeamCity 7.3 High2024-03-04
CVE-2024-0550 AnythingLLM 安全漏洞 — mintplex-labs/anything-llm 4.9 -2024-02-28
CVE-2023-42791 Fortinet FortiManager和FortiAnalyzer 安全漏洞 — FortiManager 8.6 High2024-02-20
CVE-2024-22226 Dell Unity 路径遍历漏洞 — Unity 3.3 Low2024-02-12
CVE-2024-24942 JetBrains TeamCity 安全漏洞 — TeamCity 5.3 Medium2024-02-06
CVE-2024-24940 JetBrains IntelliJ IDEA 安全漏洞 — IntelliJ IDEA 2.8 Low2024-02-06
CVE-2024-24938 JetBrains TeamCity 安全漏洞 — TeamCity 5.3 Medium2024-02-06
CVE-2021-22281 B&R Industrial Automation Studio 路径遍历漏洞 — Automation Studio 6.3 Medium2024-02-02
CVE-2024-22096 Rapid Software Rapid SCADA 安全漏洞 — Rapid SCADA 6.5 Medium2024-02-01
CVE-2024-22415 jupyterlab-lsp 安全漏洞 — jupyterlab-lsp 7.3 High2024-01-18
CVE-2023-31036 NVIDIA Triton Inference Server 安全漏洞 — Triton Inference Server 7.5 High2024-01-12
CVE-2023-50255 Deepin-Compressor 安全漏洞 — developer-center 9.3 Critical2023-12-27
CVE-2023-6722 Repox 安全漏洞 — Repox 7.5 High2023-12-13
CVE-2023-6307 JeecgBoot JimuReport 安全漏洞 — JimuReport 6.3 Medium2023-11-27
CVE-2023-5189 Red Hat Ansible Automation 安全漏洞 — Red Hat Ansible Automation Platform 2.4 for RHEL 8 6.3 Medium2023-11-14

CWE-23(相对路径遍历) 是常见的弱点类别,本平台收录该类弱点关联的 345 条 CVE 漏洞。