Statements (15)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-21
gptkb:CWE-22 gptkb:CWE-23 |
gptkbp:category |
Path Traversal
|
gptkbp:example |
Using a file path like '/etc/passwd' in a web application.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-36
|
gptkbp:impact |
Allows attackers to access files outside of the intended directory.
|
gptkbp:is_described_as |
The software uses an absolute path name that is controlled by an attacker.
|
gptkbp:is_protected_by |
Validate and sanitize user inputs.
Use relative paths instead of absolute paths. |
gptkbp:name |
Absolute Path Traversal
|
gptkbp:related_to |
gptkb:CWE-22
gptkb:CWE-23 |