Unsanitized User Input in File Path
Overview
Rule ID:
java_lang_path_using_user_input
Applicable Languages: Java
Weakness ID: CWE-73
Description
Unsanitized user input in file path resolution can lead to security vulnerabilities. This issue arises when an application directly uses input from the user to determine file paths or names without proper validation or sanitization. Attackers can exploit this to access unauthorized files or directories, leading to data breaches or other security compromises.
Remediation Guidelines
Avoid incorporating user input directly into file paths without proper sanitization, as this practice can enable attackers to manipulate file paths and potentially access unauthorized files.
Instead, employ a safelist to specify permissible paths or directories. Limit user input to influence file paths only within these predefined, secure boundaries.
Ensure to sanitize user input used in file path resolution. For instance, utilize methods like
FilenameUtils.getName()
to safely extract the intended file name from user input, thereby mitigating any attempts at path manipulation.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated