"Common Web Application Security issues"---4, Directory traversal

Source: Internet
Author: User
Tags sql injection attack xpath

The security issues of Web applications are divided by the situation they exist, and there are a variety of things that are not intended to be introduced here, but are only common ones.

A list of common Web application security issues:

1. Cross-site scripting attacks (CSS or XSS, crosses site Scripting)
2. SQL injection attack (SQL injection)
3, Remote command Execution (code execution, personally think translated into code execution is not accurate)
4. Directory traversal (Directory traversal)
5, file contains (Files inclusion)
6. Scripting code exposure (script source code disclosure)
7. Additional carriage return feed for HTTP request header (CRLF injection/http response splitting)
8. Cross Frame Scripting Attack (crosses frame Scripting)
9, PHP code injection (PHP injection)
10. XPath Injection
11. Cookie tampering (Cookie manipulation)
12. URL redirection (URL redirection)
13, Blind Sql/xpath injection for numeric/string inputs
14, Google Hacking

Directory Traversal (Directory traversal)

Some friends should know before I published the ah163 in my blog. NET security vulnerability, High security: extremely dangerous, because I did not publish the details, everyone is more curious to know what is. With respect to the peers, I removed the vulnerability announcement column. I have informed ah163. NET peers, they have fix that problem.

Today we will talk about this loophole. Love.ah163.net on the network hard disk service, when registered users log in and open the network hard disk service, you can enter their own hard disk management interface, we see how it enters a directory, the following is entered into a directory of the url:http://love.ah163.net/ Personal_spaces_list.php?dir=myfolder

Now I'm going to modify this URL: http://love.ah163.net/Personal_Spaces_List.php?dir=. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /.. /usr/local/apache/conf/

What is the result of running it in a browser? The result is: all the files in the/usr/local/apache/conf/are honestly listed, in this way, you can play your imagination, the server is not nearly all the things can be listed? Tell you, you can also download it casually! Network hard disk, is used to upload the download, so it provides a complete function, destructive is very strong. As to the harm of it, you want to go, I will not alarmist.

Short-Answer solution:

1. Also restricts the Web application from running on the server

2, strict input verification, control user input illegal path

This article from: http://blog.csdn.net/iwebsecurity/article/details/1693877

"Common Web Application Security issues"---4, Directory traversal

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.