Path Traversal (Directory Traversal)

This vulnerability enables an attacker to read arbitrary files on the server that is running an application.

The sequence ../ is valid within a file path, and means to step up one level in the directory structure.

On Windows, both ../ and *..* are valid directory traversal sequences.

Files to check for in Linux: /etc/passwd

Files to check for in Windows: \windows\win.ini

Last updated