Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-44 (路径等价:’file.name’ (内部点号)) — Vulnerability Class 1

1 vulnerabilities classified as CWE-44 (路径等价:’file.name’ (内部点号)). AI Chinese analysis included.

CWE-44 is a path traversal weakness occurring when software accepts file paths containing internal dots without proper validation. This flaw allows attackers to manipulate input strings, such as "file.name," to bypass intended access controls and traverse the directory structure to reach sensitive or unintended files. By exploiting ambiguous path resolution mechanisms, malicious actors can read, modify, or delete critical system resources outside the expected scope. To mitigate this risk, developers must implement strict input validation that sanitizes all user-supplied path components. Utilizing canonicalization functions to resolve paths to their absolute form before comparison ensures consistency. Additionally, employing allowlists for permitted file extensions and restricting access to specific directories further prevents unauthorized traversal, thereby securing the application against these ambiguous resolution attacks.

MITRE CWE Description
The product accepts path input in the form of internal dot ('file.ordir') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.
Common Consequences (1)
Confidentiality, IntegrityRead Files or Directories, Modify Files or Directories

Vulnerabilities classified as CWE-44 (路径等价:’file.name’ (内部点号)) represent 1 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.