Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-35 (路径遍历:’…/…//’) — Vulnerability Class 149

149 vulnerabilities classified as CWE-35 (路径遍历:’…/…//’). AI Chinese analysis included.

CWE-35 represents a critical path traversal vulnerability where software fails to properly sanitize input containing the specific sequence ‘.../...//’. This weakness allows attackers to bypass directory restrictions by exploiting how certain operating systems or application frameworks resolve these unusual path segments. By injecting this sequence into user-controlled input, an adversary can manipulate file system navigation to access sensitive files located outside the intended restricted directory, potentially leading to unauthorized data disclosure or system compromise. Developers mitigate this risk by implementing rigorous input validation that strictly rejects or neutralizes all path traversal characters, including this specific triple-dot variant. Additionally, using canonicalization functions to resolve paths before comparison and enforcing strict allow-lists for permitted file extensions ensures that external input cannot redirect execution to unintended system locations.

MITRE CWE Description
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories, Bypass Protection Mechanism
Not properly neutralizing '.../...//' (doubled triple dot slash) allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
Examples (1)
Suppose the product serves files from a specific "public" directory -- /home/product/public/ -- and has an algorithm that attempts to protect against common path traversal attacks. The algorithm works by sequentially scanning through a requested filename and removes each occurrence of "../" that it encounters, then appending the filename to the public directory.
../secret.dat
Attack
/home/product/public/secret.dat
Result
CVE IDTitleCVSSSeverityPublished
CVE-2024-38706 WordPress HT Mega plugin <= 2.5.7 - JSON Path Traversal vulnerability — HT Mega 6.5 Medium2024-07-12
CVE-2024-36991 Path Traversal on the “/modules/messaging/“ endpoint in Splunk Enterprise on Windows — Splunk Enterprise 7.5 High2024-07-01
CVE-2024-5481 Photo Gallery by 10Web – Mobile-Friendly Image Gallery <= 1.8.23 - Authenticated (Contributor+) Path Traversal via esc_dir Function — Photo Gallery by 10Web – Mobile-Friendly Image Gallery 6.8 Medium2024-06-07
CVE-2024-2654 File Manager <= 7.2.5 - Authenticated (Administrator+) Directory Traversal — File Manager 6.8 Medium2024-04-09
CVE-2024-27901 Directory Traversal vulnerability in SAP Asset Accounting — SAP Asset Accounting 7.2 High2024-04-09
CVE-2024-2863 Path traversal via file upload on LG LED Assistant — LG LED Assistant 5.3 Medium2024-03-25
CVE-2023-41793 Path Traversal and Untrusted Upload File — Pandora FMS 6.7 Medium2024-03-19
CVE-2024-1886 Absolute path traversal attack on LG Signage — LG Signage 3.0 Low2024-02-26
CVE-2023-5800 Insufficient input validation in VAPIX API create_overlay.cgi — AXIS OS 5.4 Medium2024-02-05
CVE-2023-46690 Delta Electronics InfraSuite Device Master Path Traversal — InfraSuite Device Master 8.8 High2023-11-30
CVE-2023-5885 Franklin Electric Fueling Systems Colibri Path Traversal — Colibri 6.5 Medium2023-11-27
CVE-2023-6252 Path traversal vulnerability in Chameleon Power products — Chameleon Power 7.5 High2023-11-22
CVE-2023-21418 AXIS OS 安全漏洞 — AXIS OS 7.1 High2023-11-21
CVE-2023-21417 AXIS Os 安全漏洞 — AXIS OS 7.1 High2023-11-21
CVE-2023-21416 AXIS OS 安全漏洞 — AXIS OS 7.1 High2023-11-21
CVE-2023-21415 AXIS OS 路径遍历漏洞 — AXIS OS 6.5 Medium2023-10-16
CVE-2023-39916 Possible path traversal when storing RRDP responses — Routinator 9.3 Critical2023-09-13
CVE-2023-32714 Path Traversal in Splunk App for Lookup File Editing — Splunk App for Lookup File Editing 8.1 High2023-06-01
CVE-2022-48476 JetBrains Ktor framework 路径遍历漏洞 — Ktor 7.5 High2023-04-24
CVE-2022-3693 Path traversal in FileOrbis File Management System — FileOrbis File Management System 7.5 High2023-01-13
CVE-2022-36928 Path Traversal in Zoom for Android Clients — Zoom for Android 6.1 Medium2023-01-09
CVE-2022-46826 JetBrains IntelliJ IDEA 路径遍历漏洞 — IntelliJ IDEA 6.2 Medium2022-12-08
CVE-2022-2265 Path traversal in Identity and Directory Management System — Çekino Bilgi Teknolojileri 7.5 High2022-09-21
CVE-2021-1355 Cisco Unified Communications Products Vulnerabilities — Cisco Unified Communications Manager 6.5 Medium2021-01-20
CVE-2021-1357 Cisco Unified Communications Products Vulnerabilities — Cisco Unified Communications Manager 6.5 Medium2021-01-20
CVE-2021-1364 Cisco Unified Communications Products Vulnerabilities — Cisco Unified Communications Manager 6.5 Medium2021-01-20
CVE-2021-1282 Cisco Unified Communications Products Vulnerabilities — Cisco Unified Communications Manager 6.5 Medium2021-01-20
CVE-2020-27130 Cisco Security Manager Path Traversal Vulnerability — Cisco Security Manager 9.1 Critical2020-11-17
CVE-2018-3744 html-pages node模块路径遍历漏洞 — html-pages node module 9.1 -2018-05-29

Vulnerabilities classified as CWE-35 (路径遍历:’…/…//’) represent 149 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.