Statements (14)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:category |
Path Traversal
|
gptkbp:example |
Using user input to construct file paths without validation.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-22
|
gptkbp:impact |
Unauthorized access to files or directories
|
gptkbp:investment |
gptkb:High
|
gptkbp:is_described_as |
CWE-22 refers to a weakness where an application does not properly restrict access to a directory.
|
gptkbp:is_protected_by |
Validate and sanitize user input.
|
gptkbp:name |
Improper Limitation of a Pathname to a Restricted Directory
|
gptkbp:related_to |
gptkb:CWE-23
gptkb:CWE-36 |
gptkbp:bfsParent |
gptkb:JEP_413
gptkb:CWE-20 |
gptkbp:bfsLayer |
5
|