Contents
Directory traversal attack
A directory traversal (or path traversal) attack exploits insufficient security validation or sanitization of user-supplied file names, such that characters representing "traverse to parent directory" are passed through to the operating system's file system API. An affected application can be exploited to gain unauthorized access to the file system.
Examples
In PHP
A typical example of a vulnerable application in PHP code is: An attack against this system could be to send the following HTTP request: The server would then generate a response such as: The repeated characters after have caused to traverse to the root directory, and then include the Unix password file. Unix is a common file used to demonstrate directory traversal, as it is often used by crackers to try cracking the passwords. However, in more recent Unix systems, the file does not contain the hashed passwords, and they are instead located in the file, which cannot be read by unprivileged users on the machine. Even in that case, though, reading does still show a list of user accounts.
Zip Slip vulnerability
Another example is the Zip Slip vulnerability that affects several archive file formats like ZIP.
Variations
Directory traversal in its simplest form uses the pattern. Some common variations are listed below:
Microsoft Windows
Microsoft Windows and DOS directory traversal uses the or patterns. Each partition has a separate root directory (labeled where C could be any partition), and there is no common root directory above that. This means that for most directory vulnerabilities on Windows, attacks are limited to a single partition. Directory traversal has been the cause of numerous Microsoft vulnerabilities.
Percent encoding in URIs
Some web applications attempt to prevent directory traversal by scanning the path of a request URI for patterns such as. This check is sometimes mistakenly performed before percent-decoding, causing URIs containing patterns like to be accepted despite being decoded into before actual use.
Double encoding
Percent decoding may accidentally be performed multiple times; once before validation, but again afterwards, making the application vulnerable to Double percent-encoding attacks in which illegal characters are replaced by their double-percent-encoded form in order to bypass security countermeasures. For example, in a double percent-encoding attack, may be replaced by its double-percent-encoded form. This kind of vulnerability notably affected versions 5.0 and earlier of Microsoft's IIS web server software.
UTF-8
A badly implemented UTF-8 decoder may accept characters encoded using more bytes than necessary, leading to alternative character representations, such as and both representing. This is specifically forbidden by the UTF-8 standard, but has still led to directory traversal vulnerabilities in software such as the IIS web server.
Archives
Some archive formats like zip allow for directory traversal attacks: files in the archive can be written such that they overwrite files on the filesystem by backtracking. Code that extracts archive files can be written to check that the paths of the files in the archive do not engage in path traversal.
Prevention
A possible algorithm for preventing directory traversal would be to: Using a hard-coded predefined file extension to suffix the path does not necessarily limit the scope of the attack to files of that file extension. The user can use the NULL character (indicating the end of the string) in order to bypass everything after the. (This is PHP-specific.)
Resources
This article is derived from Wikipedia and licensed under CC BY-SA 4.0. View the original article.
Wikipedia® is a registered trademark of the
Wikimedia Foundation, Inc.
Bliptext is not
affiliated with or endorsed by Wikipedia or the
Wikimedia Foundation.