1 vulnerabilities classified as CWE-249. AI Chinese analysis included.
CWE-249, now deprecated due to conceptual overlap with CWE-785, originally described path manipulation vulnerabilities where applications fail to properly sanitize user-supplied input before using it in file system operations. Attackers typically exploit this weakness by injecting special characters, such as dots and slashes, into input fields to traverse directory structures or access unauthorized files outside the intended scope. This often leads to sensitive data exposure, denial of service, or remote code execution if the manipulated path points to executable scripts. To prevent such exploits, developers must rigorously validate and sanitize all user inputs, ensuring they conform to expected formats. Implementing strict allowlists for permitted characters and using canonicalization techniques to resolve symbolic links further mitigates risks. Additionally, employing secure coding practices like chroot jails or sandboxing limits the potential impact of any successful path traversal attempt.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-3932 | Crestron Electronics AM-100和Crestron Electronics AM-101 信任管理问题漏洞 — Crestron AirMedia | 9.8 | - | 2019-04-30 |
Vulnerabilities classified as CWE-249 represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.