Unsanitized use of FileUpload filename

Overview

  • Rule ID: java_lang_file_upload_filename

  • Applicable Languages: Java

  • Weakness ID: CWE-73

Description

Failure to sanitize filenames from FileUpload can result in path traversal attacks. This vulnerability arises when an attacker manipulates the filename to access files or directories located outside the designated directory.

Remediation Guidelines

  • Avoid using unsanitized filenames directly from FileUpload, as attackers can exploit them to navigate the server's directory structure.

  • Always sanitize user input when managing file paths. Utilize secure methods such as FilenameUtils.getName() to ensure the path is protected and cannot be manipulated for directory traversal."

References

Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL

Last updated