Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-39 (路径遍历:’C:dirname’) — Vulnerability Class 1

1 vulnerabilities classified as CWE-39 (路径遍历:’C:dirname’). AI Chinese analysis included.

CWE-39 represents a path traversal vulnerability specifically involving Windows drive letters, allowing attackers to redirect file access to unintended locations. This weakness occurs when software fails to properly sanitize input containing drive designators like 'C:dirname', enabling malicious users to bypass intended directory restrictions and access arbitrary files or system resources. Exploitation typically involves injecting these drive letters into user-controlled parameters, such as file paths or URLs, to traverse outside the expected application directory. To mitigate this risk, developers must implement strict input validation that rejects or escapes drive letters and special characters. Additionally, using canonicalization techniques to resolve paths before access checks and enforcing strict allow-lists for permitted directories ensures that user input cannot manipulate the file system structure, thereby preventing unauthorized data exposure or system compromise.

MITRE CWE Description
The product accepts input that contains a drive letter or Windows volume letter ('C:dirname') that potentially redirects access to an unintended location or arbitrary file.
Common Consequences (4)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
IntegrityModify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow …
ConfidentialityRead Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing a…
AvailabilityDoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the software from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the s…
Mitigations (2)
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Effectiveness: High
ImplementationInputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass allowlist validation schemes by introducing dangerous inputs after they have been checked.
CVE IDTitleCVSSSeverityPublished
CVE-2017-16609 Netgain Enterprise Manager 安全漏洞 — NetGain Systems Enterprise Manager 7.5 -2018-01-23

Vulnerabilities classified as CWE-39 (路径遍历:’C:dirname’) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.