2 vulnerabilities classified as CWE-32 (路径遍历:’…’ (三个点号)). AI Chinese analysis included.
CWE-32 represents a path traversal vulnerability where software fails to properly sanitize triple-dot sequences within user-supplied input used to construct file paths. Attackers exploit this weakness by injecting specific character sequences, such as ‘...’, into input fields to bypass directory restrictions and access sensitive files located outside the intended scope. This manipulation allows the application to resolve the path incorrectly, granting unauthorized access to critical system resources or confidential data. To mitigate this risk, developers must implement rigorous input validation, ensuring that all path components are strictly checked against allowed characters and patterns. Additionally, using canonicalization techniques to resolve paths before access checks, combined with strict whitelisting of permitted directories, effectively neutralizes these traversal attempts and secures the application’s file system integrity.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-41784 | IBM Sterling Secure Proxy directory traversal — Sterling Secure Proxy | 7.5 | High | 2024-11-15 |
| CVE-2024-6049 | Unauthenticated Path Traversal — vsm LTC Time Sync (vTimeSync) | 7.5AI | HighAI | 2024-10-24 |
Vulnerabilities classified as CWE-32 (路径遍历:’…’ (三个点号)) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.