CWE-22

GPTKB entity

Statements (14)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:category Path Traversal
gptkbp:example Using user input to construct file paths without validation.
https://www.w3.org/2000/01/rdf-schema#label CWE-22
gptkbp:impact Unauthorized access to files or directories
gptkbp:investment gptkb:High
gptkbp:is_described_as CWE-22 refers to a weakness where an application does not properly restrict access to a directory.
gptkbp:is_protected_by Validate and sanitize user input.
gptkbp:name Improper Limitation of a Pathname to a Restricted Directory
gptkbp:related_to gptkb:CWE-23
gptkb:CWE-36
gptkbp:bfsParent gptkb:JEP_413
gptkb:CWE-20
gptkbp:bfsLayer 5