CWE-73: External Control of File Name or Path
ID
CWE-73
Abstraction
Base
Structure
Simple
Status
Draft
Number of CVEs
135
The product allows user input to control or influence paths or file names that are used in filesystem operations.
This could allow an attacker to access or modify system files or other files that are critical to the application.
Path manipulation errors occur when the following two conditions are met:
1. An attacker can specify a path used in an operation on the filesystem.
2. By specifying the resource, the attacker gains a capability that would not otherwise be permitted.
For example, the program may give the attacker the ability to overwrite the specified file or run with a configuration controlled by the attacker.
Modes of Introduction
Phase | Note |
---|---|
Architecture and Design | |
Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Applicable Platforms
Type | Class | Name | Prevalence |
---|---|---|---|
Language | Not Language-Specific | ||
Operating_system | Unix | ||
Operating_system | Windows | ||
Operating_system | macOS |
Relationships
View | Weakness | |||||||
---|---|---|---|---|---|---|---|---|
# ID | View | Status | # ID | Name | Abstraction | Structure | Status | |
CWE-1000 | Research Concepts | Draft | CWE-642 | External Control of Critical State Data | Class | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-610 | Externally Controlled Reference to a Resource in Another Sphere | Class | Simple | Draft | |
CWE-700 | Seven Pernicious Kingdoms | Incomplete | CWE-20 | Improper Input Validation | Class | Simple | Stable | |
CWE-1000 | Research Concepts | Draft | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | Base | Simple | Stable | |
CWE-1000 | Research Concepts | Draft | CWE-41 | Improper Resolution of Path Equivalence | Base | Simple | Incomplete | |
CWE-1000 | Research Concepts | Draft | CWE-98 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') | Variant | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-434 | Unrestricted Upload of File with Dangerous Type | Base | Simple | Draft | |
CWE-1000 | Research Concepts | Draft | CWE-59 | Improper Link Resolution Before File Access ('Link Following') | Base | Simple | Draft |
Common Attack Pattern Enumeration and Classification (CAPEC)
The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.
CAPEC at Mitre.org# ID | Name | Weaknesses |
---|---|---|
CAPEC-13 | Subverting Environment Variable Values | CWE-73 |
CAPEC-64 | Using Slashes and URL Encoding Combined to Bypass Validation Logic | CWE-73 |
CAPEC-72 | URL Encoding | CWE-73 |
CAPEC-76 | Manipulating Web Input to File System Calls | CWE-73 |
CAPEC-78 | Using Escaped Slashes in Alternate Encoding | CWE-73 |
CAPEC-79 | Using Slashes in Alternate Encoding | CWE-73 |
CAPEC-80 | Using UTF-8 Encoding to Bypass Validation Logic | CWE-73 |
CAPEC-267 | Leverage Alternate Encoding | CWE-73 |
CVEs Published
CVSS Severity
CVSS Severity - By Year
CVSS Base Score
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |
Loading...