目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-36 绝对路径遍历 类漏洞列表 106

CWE-36 绝对路径遍历 类弱点 106 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-36绝对路径遍历属于文件访问控制漏洞。当软件利用外部输入构建受限目录内的文件路径时,若未正确过滤绝对路径序列(如“/abs/path”),攻击者即可绕过限制,访问受限目录外的敏感文件或系统资源。开发者应严格验证输入,禁止使用绝对路径,并采用白名单机制或规范化路径处理,确保最终解析路径始终位于预期的安全沙箱内。

MITRE CWE 官方描述
CWE:CWE-36 绝对路径遍历 (Absolute Path Traversal) 英文:该产品使用外部输入来构建一个应位于受限目录内的路径名,但它未能正确中和绝对路径序列(如 "/abs/path"),这些序列可能解析为位于该目录之外的位置。 这允许攻击者遍历文件系统,以访问受限目录之外的文件或目录。
常见影响 (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing a…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the pr…
缓解措施 (3)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
OperationUse an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth [REF-1481].
Effectiveness: Moderate
代码示例 (2)
In the example below, the path to a dictionary file is read from a system property and used to initialize a File object.
String filename = System.getProperty("com.domain.application.dictionaryFile"); File dictionaryFile = new File(filename);
Bad · Java
This script intends to read a user-supplied file from the current directory. The user inputs the relative path to the file and the script uses Python's os.path.join() function to combine the path to the current working directory with the provided path to the specified file. This results in an absolute path to the desired file. If the file does not exist when the script attempts to read it, an erro…
import os import sys def main(): filename = sys.argv[1] path = os.path.join(os.getcwd(), filename) try: with open(path, 'r') as f: file_data = f.read() except FileNotFoundError as e: print("Error - file not found") main()
Bad · Python
import os import sys def main(): filename = sys.argv[1] path = os.path.normpath(f"{os.getcwd()}{os.sep}{filename}") if path.startswith("/home/cwe/documents/"): try: with open(path, 'r') as f: file_data = f.read() except FileNotFoundError as e: print("Error - file not found") main()
Good · Python
CVE ID标题CVSS风险等级Published
CVE-2026-6418 PaperCut NG/MF 共享账户同步路径遍历漏洞 — PaperCut NG/MF 2.7AILowAI2026-05-05
CVE-2026-44029 Nix <2.34.7目录遍历致任意文件写入 — Nix 5.3 Medium2026-05-05
CVE-2026-7217 PromptX 路径遍历漏洞 — PromptX 5.3 Medium2026-04-28
CVE-2026-34515 aiohttp 代码问题漏洞 — aiohttp 5.3 -2026-04-01
CVE-2026-4373 WordPress plugin JetFormBuilder 安全漏洞 — JetFormBuilder — Dynamic Blocks Form Builder 7.5 High2026-03-21
CVE-2026-0846 NLTK 安全漏洞 — nltk/nltk 7.5 -2026-03-09
CVE-2026-2753 Navtor NavBox 安全漏洞 — NavBox 7.5 High2026-03-06
CVE-2026-28414 Gradio 安全漏洞 — gradio 7.5 High2026-02-27
CVE-2026-26337 Hyland Alfresco Transformation Service 安全漏洞 — Alfresco Transformation Service (Enterprise) 8.2 High2026-02-19
CVE-2026-1330 HAMASTAR MeetingHub 安全漏洞 — MeetingHub 7.5 High2026-01-22
CVE-2026-1020 Code-Projects Police Station Management System 安全漏洞 — Police Statistics Database System 5.3 Medium2026-01-16
CVE-2026-1018 Code-Projects Police Station Management System 安全漏洞 — Police Statistics Database System 7.5 High2026-01-16
CVE-2026-20834 Microsoft Windows Shell 安全漏洞 — Windows 10 Version 1607 4.6 Medium2026-01-13
CVE-2025-15237 Quanta QOCA aim AI Medical Cloud Platform 安全漏洞 — QOCA aim AI Medical Cloud Platform 4.3 Medium2026-01-05
CVE-2025-15236 Quanta QOCA aim AI Medical Cloud Platform 安全漏洞 — QOCA aim AI Medical Cloud Platform 4.3 Medium2026-01-05
CVE-2025-15227 WELLTEND BPMFlowWebkit 安全漏洞 — BPMFlowWebkit 7.5 High2025-12-29
CVE-2025-14848 Advantech WebAccess/SCADA 安全漏洞 — WebAccess/SCADA 4.3 Medium2025-12-18
CVE-2025-67898 Mailjet MJML 安全漏洞 — MJML 4.5 Medium2025-12-14
CVE-2025-34392 Barracuda Service Center 安全漏洞 — RMM 9.8AICriticalAI2025-12-10
CVE-2025-14253 Galaxy Software Services Vitals ESP 安全漏洞 — Vitals ESP 4.9 Medium2025-12-08
CVE-2025-36357 AMD Store Queue 安全漏洞 — IBM Planning Analytics Local 8.0 High2025-11-17
CVE-2025-7846 WordPress plugin User Extra Fields 安全漏洞 — WordPress User Extra Fields 8.8 High2025-10-31
CVE-2025-8575 WordPress plugin LWS Cleaner 安全漏洞 — LWS Cleaner 7.2 High2025-09-12
CVE-2025-9518 WordPress plugin atec Debug 安全漏洞 — atec Debug 7.2 High2025-09-04
CVE-2025-9516 WordPress plugin atec Debug 安全漏洞 — atec Debug 4.9 Medium2025-09-04
CVE-2025-9259 WebITR 安全漏洞 — WebITR 6.5 Medium2025-08-22
CVE-2025-9258 Uniong WebITR 安全漏洞 — WebITR 6.5 Medium2025-08-22
CVE-2025-9257 Uniong WebITR 安全漏洞 — WebITR 6.5 Medium2025-08-22
CVE-2025-9256 WebITR 安全漏洞 — WebITR 6.5 Medium2025-08-22
CVE-2025-57790 Commvault 安全漏洞 — CommCell 9.8 -2025-08-20

CWE-36(绝对路径遍历) 是常见的弱点类别,本平台收录该类弱点关联的 106 条 CVE 漏洞。