Unsanitized User Input in File Path Traversal
Overview
Rule ID:
java_lang_path_traversal
Applicable Languages: Java
Weakness ID: CWE-73
Description
Using unsanitized user input in file paths can jeopardize your system's security. This vulnerability occurs when user input is directly employed to form file names or paths without adequate sanitization, potentially resulting in path manipulation. Attackers may exploit this to access files or directories beyond the intended scope, posing a substantial security risk.
Remediation Guidelines
Avoid directly constructing file paths using user input, as this practice can inadvertently enable attackers to manipulate paths to access unauthorized files.
Instead, utilize path normalization utilities to securely manage user input in file paths. These utilities help mitigate risks associated with dangerous path sequences.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated