Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-24 (路径遍历:’../filedir’) — Vulnerability Class 91

91 vulnerabilities classified as CWE-24 (路径遍历:’../filedir’). AI Chinese analysis included.

CWE-24 represents a critical input validation weakness where software fails to properly sanitize user-supplied data before constructing file paths. Attackers typically exploit this vulnerability by injecting directory traversal sequences, such as "../", into input fields to manipulate the resulting pathname. This manipulation allows the application to resolve paths outside the intended restricted directory, enabling unauthorized access to sensitive system files, configuration data, or source code. To mitigate this risk, developers must implement robust input validation strategies that strictly whitelist allowed characters and reject any path components containing traversal sequences. Additionally, employing canonicalization techniques to normalize paths before validation ensures that encoded or double-encoded attacks are detected. Restricting file system access through chroot jails or containerization further limits the potential impact of successful exploitation, ensuring that even if validation fails, the attacker cannot escape the designated secure boundary.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize "../" sequences that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. The "../" manipulation is the canonical manipulation for operating systems that use "/" as directory separators, such as UNIX- and Linux-based systems. In some cases, it is useful for bypassing protection schemes in environments for which "/" is supported but not the primary separator, such as Windows, which uses "\" but can also accept "/".
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
CVE IDTitleCVSSSeverityPublished
CVE-2023-7134 SourceCodester Medicine Tracking System path traversal — Medicine Tracking System 6.3 Medium2023-12-28
CVE-2023-7098 icret EasyImages hide.php path traversal — EasyImages 3.1 Low2023-12-25
CVE-2023-7058 SourceCodester Simple Student Attendance System path traversal — Simple Student Attendance System 6.3 Medium2023-12-22
CVE-2023-7041 codelyfe Stupid Simple CMS rename.php path traversal — Stupid Simple CMS 5.4 Medium2023-12-21
CVE-2023-7040 codelyfe Stupid Simple CMS rename.php path traversal — Stupid Simple CMS 4.3 Medium2023-12-21
CVE-2023-6900 rmountjoy92 DashMachine delete_file path traversal — DashMachine 4.6 Medium2023-12-17
CVE-2018-25094 ระบบบัญชีออนไลน์ Online Accounting System image.php path traversal — Online Accounting System 3.5 Low2023-12-03
CVE-2023-4171 Chengdu Flash Flood Disaster Monitoring and Warning System FileDownload.ashx path traversal — Flash Flood Disaster Monitoring and Warning System 4.3 Medium2023-08-05
CVE-2023-3240 OTCMS usersNews_deal.php path traversal — OTCMS 3.5 Low2023-06-14
CVE-2023-3239 OTCMS path traversal — OTCMS 3.5 Low2023-06-14
CVE-2023-3098 KylinSoft youker-assistant restore_all_sound_file path traversal — youker-assistant 4.4 Medium2023-06-05
CVE-2023-3057 YFCMF Ajax.php path traversal — YFCMF 4.3 Medium2023-06-02
CVE-2023-3056 YFCMF index.php path traversal — YFCMF 4.3 Medium2023-06-02
CVE-2023-20166 Cisco Identity Services Engine Path Traversal Vulnerabilities — Cisco Identity Services Engine Software 6.0 Medium2023-05-18
CVE-2023-20167 Cisco Identity Services Engine Path Traversal Vulnerabilities — Cisco Identity Services Engine Software 6.0 Medium2023-05-18
CVE-2023-20098 Cisco SD-WAN vManage 路径遍历漏洞 — Cisco SD-WAN vManage 4.4 Medium2023-05-09
CVE-2023-1800 sjqzhang go-fastdfs File Upload uploa upload path traversal — go-fastdfs 7.3 High2023-04-02
CVE-2023-1398 XiaoBingBy TeaCMS upload path traversal — TeaCMS 6.3 Medium2023-03-14
CVE-2014-125033 rails-cv-app uploaded_files_controller.rb path traversal — rails-cv-app 3.5 Low2023-01-02
CVE-2019-25087 RamseyK httpserver URI ResourceHost.cpp getResource path traversal — httpserver 5.3 Medium2022-12-27
CVE-2022-36065 GrowthBook account creation and file upload vulnerability in self-hosted configurations — growthbook 7.5 High2022-09-06
CVE-2022-1743 2.2.5 PATH TRAVERSAL: '../FILEDIR' CWE-24 — ImageCast X application 6.8 -2022-06-24
CVE-2022-29253 Path Traversal in XWiki Platform — xwiki-platform 2.7 Low2022-05-25
CVE-2020-7882 anySign directory traversal vulnerability — anySign4PC 7.5 High2021-11-22
CVE-2021-21706 ZipArchive::extractTo may extract outside of destination dir — PHP 5.3 Medium2021-10-04
CVE-2021-3710 Apport info disclosure via path traversal bug in read_file — apport 6.5 Medium2021-10-01
CVE-2021-29466 Path Traversal at Discord-Recon .recon Command Path — Discord-Recon 6.5 Medium2021-04-22
CVE-2021-26725 Authenticated command path traversal on timezone settings in Guardian/CMC before 20.0.7.4 — Guardian 7.2 High2021-02-22
CVE-2020-8568 Kubernetes Secrets Store CSI Driver sync/rotate directory traversal — Kubernetes Secrets Store CSI Driver 5.8 Medium2021-01-21
CVE-2020-8567 Kubernetes Secrets Store CSI Driver plugin directory traversals — Kubernetes Secrets Store CSI Driver 4.9 Medium2021-01-21

Vulnerabilities classified as CWE-24 (路径遍历:’../filedir’) represent 91 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.