CWE-56 路径等价:'filedir*'(通配符)

Path Equivalence: 'filedir*' (Wildcard)

结构: Simple

Abstraction: Variant

状态: Incomplete

被利用可能性: unkown

基本描述

A software system that accepts path input in the form of asterisk wildcard ('filedir*') without appropriate validation can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 41 cwe_View_ID: 699 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 155 cwe_View_ID: 1000

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
['Confidentiality', 'Integrity'] ['Read Files or Directories', 'Modify Files or Directories']

可能的缓解方案

MIT-20 Implementation

策略: Input Validation

Inputs should be decoded and canonicalized to the application's current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass whitelist validation schemes by introducing dangerous inputs after they have been checked.

分析过的案例

标识 说明 链接
CVE-2004-0696 List directories using desired path and "*" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0696
CVE-2002-0433 List files in web server using "*.ext" https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0433

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER filedir* (asterisk / wildcard)
Software Fault Patterns SFP16 Path Traversal