Path Equivalence: 'fakedir/../realdir/filename' |
Weakness ID: 57 (Weakness Variant) | Status: Incomplete |
Description Summary
The software contains protection mechanisms to restrict access to 'realdir/filename', but it constructs pathnames using external input in the form of 'fakedir/../realdir/filename' that are not handled by those mechanisms. This allows attackers to perform unauthorized actions against the targeted file.
Reference | Description |
---|---|
CVE-2001-1152 | |
CVE-2000-0191 | application check access for restricted URL before canonicalization |
CVE-2005-1366 | CGI source disclosure using "dirname/../cgi-bin" |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Base | 41 | Improper Resolution of Path Equivalence | Development Concepts (primary)699 Research Concepts (primary)1000 |
This is a manipulation that uses an injection for one consequence (containment violation using relative path) to achieve a different consequence (equivalence by alternate name). |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | dirname/fakechild/../realchild/filename |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Other Notes, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Description, Name, Observed Examples, Other Notes, Theoretical Notes | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | Path Issue - dirname/fakechild/../realchild/filename | |||
2008-10-14 | Path Equivalence: 'dirname/fakechild/../realchild/filename' | |||