Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-29 (路径遍历:’..filename’) — Vulnerability Class 61

61 vulnerabilities classified as CWE-29 (路径遍历:’..filename’). AI Chinese analysis included.

CWE-29 represents a critical input validation weakness where software fails to properly sanitize path traversal sequences, specifically the leading backslash-dot-dot notation. Attackers typically exploit this vulnerability by injecting malicious characters into user-supplied input fields, such as file upload forms or URL parameters, to manipulate file system navigation. By appending these sequences to a requested filename, adversaries can escape the intended restricted directory and access sensitive system files, configuration data, or other resources located outside the authorized scope. This unauthorized access can lead to severe data breaches, information disclosure, or remote code execution if the compromised files are executable. To prevent such attacks, developers must rigorously validate and sanitize all user inputs, ensuring that only alphanumeric characters and safe path separators are accepted. Additionally, implementing strict allow-lists for permitted file extensions and using canonical path resolution before accessing files helps neutralize these traversal attempts effectively.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. This is similar to CWE-25, except using "\" instead of "/". Sometimes a program checks for "..\" at the beginning of the input, so a "\..\" can bypass that check. It is also useful for bypassing path traversal protection schemes that only assume that the "/" separator is valid.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
CVE IDTitleCVSSSeverityPublished
CVE-2024-21518 OpenCart 安全漏洞 — opencart/opencart 7.2 High2024-06-22
CVE-2024-5211 Path Traversal to Arbitrary File Read/Delete/Overwrite, DoS Attack, and Admin Account Takeover in mintplex-labs/anything-llm — mintplex-labs/anything-llm 9.8AICriticalAI2024-06-12
CVE-2024-2360 Path Traversal leading to Remote Code Execution in parisneo/lollms-webui — parisneo/lollms-webui 9.8AICriticalAI2024-06-06
CVE-2024-3429 Path Traversal in parisneo/lollms — parisneo/lollms 9.1AICriticalAI2024-06-06
CVE-2024-2928 Local File Inclusion (LFI) via URI Fragment Parsing in mlflow/mlflow — mlflow/mlflow 7.5AIHighAI2024-06-06
CVE-2024-4320 Remote Code Execution due to LFI in '/install_extension' in parisneo/lollms-webui — parisneo/lollms-webui 9.8AICriticalAI2024-06-06
CVE-2024-2624 Path Traversal and Arbitrary File Upload Vulnerability in parisneo/lollms-webui — parisneo/lollms-webui 9.1AICriticalAI2024-06-06
CVE-2024-2914 TarSlip Vulnerability in deepjavalibrary/djl — deepjavalibrary/djl 9.8AICriticalAI2024-06-06
CVE-2024-2178 Path Traversal Vulnerability in parisneo/lollms-webui — parisneo/lollms-webui 7.5 -2024-06-02
CVE-2024-2361 Arbitrary Upload & Read via Path Traversal in parisneo/lollms-webui — parisneo/lollms-webui 9.1AICriticalAI2024-05-16
CVE-2024-3435 Path Traversal in parisneo/lollms-webui — parisneo/lollms-webui 9.8AICriticalAI2024-05-16
CVE-2024-3848 Path Traversal Bypass in mlflow/mlflow — mlflow/mlflow 7.5AIHighAI2024-05-16
CVE-2024-4322 Path Traversal in parisneo/lollms-webui — parisneo/lollms-webui 7.5AIHighAI2024-05-16
CVE-2024-2358 Path Traversal leading to Remote Code Execution in parisneo/lollms-webui — parisneo/lollms-webui 9.8AICriticalAI2024-05-16
CVE-2024-1561 Arbitrary Local File Read via Component Method Invocation in gradio-app/gradio — gradio-app/gradio 7.5 -2024-04-16
CVE-2024-2083 Directory Traversal in zenml-io/zenml — zenml-io/zenml 7.5 -2024-04-16
CVE-2024-3573 Local File Inclusion (LFI) via Scheme Confusion in mlflow/mlflow — mlflow/mlflow 7.5 -2024-04-16
CVE-2023-6977 Path Traversal: '\..\filename' — mlflow/mlflow 6.5 -2023-12-20
CVE-2023-6975 Path Traversal: '\..\filename' — mlflow/mlflow 8.1 -2023-12-20
CVE-2023-6909 Path Traversal: '\..\filename' in mlflow/mlflow — mlflow/mlflow 8.1AIHighAI2023-12-18
CVE-2023-6831 Path Traversal: '\..\filename' in mlflow/mlflow — mlflow/mlflow 8.1 -2023-12-15
CVE-2023-6021 Ray Log File Local File Include — ray-project/ray 7.5 High2023-11-16
CVE-2023-6023 ModelDB Local File Include — vertaai/modeldb 7.5 -2023-11-16
CVE-2023-6130 Path Traversal: '\..\filename' in salesagility/suitecrm — salesagility/suitecrm 8.1 -2023-11-14
CVE-2023-2984 Path Traversal: '\..\filename' in pimcore/pimcore — pimcore/pimcore 8.1 -2023-05-30
CVE-2023-2780 Path Traversal: '\..\filename' in mlflow/mlflow — mlflow/mlflow 8.1 -2023-05-17
CVE-2023-1177 Path Traversal: '\..\filename' in mlflow/mlflow — mlflow/mlflow 9.3 Critical2023-03-24
CVE-2023-1034 Path Traversal: '\..\filename' in salesagility/suitecrm — salesagility/suitecrm 6.5 -2023-02-25
CVE-2023-0104 Weintek EasyBuilder Pro 路径遍历漏洞 — EasyBuilder Pro cMT 9.3 Critical2023-02-22
CVE-2023-0316 Path Traversal: '\..\filename' in froxlor/froxlor — froxlor/froxlor 6.5 -2023-01-16

Vulnerabilities classified as CWE-29 (路径遍历:’..filename’) represent 61 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.