Unsanitized use of FileUpload filename
Last updated
Last updated
Rule ID: java_lang_file_upload_filename
Applicable Languages: Java
Weakness ID: CWE-73
Failure to sanitize filenames from FileUpload can result in path traversal attacks. This vulnerability arises when an attacker manipulates the filename to access files or directories located outside the designated directory.
Avoid using unsanitized filenames directly from FileUpload, as attackers can exploit them to navigate the server's directory structure.
Always sanitize user input when managing file paths. Utilize secure methods such as FilenameUtils.getName()
to ensure the path is protected and cannot be manipulated for directory traversal."
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our