1 vulnerabilities classified as CWE-39 (路径遍历:’C:dirname’). AI Chinese analysis included.
CWE-39 represents a path traversal vulnerability specifically involving Windows drive letters, allowing attackers to redirect file access to unintended locations. This weakness occurs when software fails to properly sanitize input containing drive designators like 'C:dirname', enabling malicious users to bypass intended directory restrictions and access arbitrary files or system resources. Exploitation typically involves injecting these drive letters into user-controlled parameters, such as file paths or URLs, to traverse outside the expected application directory. To mitigate this risk, developers must implement strict input validation that rejects or escapes drive letters and special characters. Additionally, using canonicalization techniques to resolve paths before access checks and enforcing strict allow-lists for permitted directories ensures that user input cannot manipulate the file system structure, thereby preventing unauthorized data exposure or system compromise.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2017-16609 | Netgain Enterprise Manager 安全漏洞 — NetGain Systems Enterprise Manager | 7.5 | - | 2018-01-23 |
Vulnerabilities classified as CWE-39 (路径遍历:’C:dirname’) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.