CWE-36

GPTKB entity

Statements (15)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-21
gptkb:CWE-22
gptkb:CWE-23
gptkbp:category Path Traversal
gptkbp:example Using a file path like '/etc/passwd' in a web application.
https://www.w3.org/2000/01/rdf-schema#label CWE-36
gptkbp:impact Allows attackers to access files outside of the intended directory.
gptkbp:is_described_as The software uses an absolute path name that is controlled by an attacker.
gptkbp:is_protected_by Validate and sanitize user inputs.
Use relative paths instead of absolute paths.
gptkbp:name Absolute Path Traversal
gptkbp:related_to gptkb:CWE-22
gptkb:CWE-23