Path Traversal
Path Traversal vulnerabilities, also known as Directory Traversal, allow attackers to manipulate file paths in order to access restricted files on a server. By exploiting this vulnerability, attackers can gain access to sensitive data, and potentially modify or delete critical files, leading to further exploitation, including full server compromise.
Vulnerable Scenarios and Examples
Relative Path
Understanding Canonicalization ".." :
Canonicalizing a path is the process of resolving the path to its simplest, absolute form by eliminating redundant elements such as ..
(parent directory) or symbolic links. Here are some examples:
Input:
/var/www/project/../index.html
Canonicalized Path:
/var/www/index.html
Input:
/usr/local/bin/../bin/ls
Canonicalized Path:
/usr/local/bin/ls
Let's say each user has their own directory which stores confidential data. To access the files, the user passes a path relative to this directory. It is obvious that other users' directories are nearby. Then, using the dot-dot-slash sequence ('..' or '../'), attackers may access the files of any user. They easily gain access to the adminPasswords.txt
file, passing the following string as the path:
Note that Windows filenames are delimited by backslash (''). To prevent such an attack, it's not enough to check that the string does not start with '../'. Attackers can use the following string for malicious purposes:
At first, they access the myFolder
directory and then the directory containing each user's data. Then, attackers access the admin
directory and get the file.
These examples show a possible way to perform a relative path traversal attack. Note that dot-dot-slash sequences allow an attacker to gain access to any file or directory on the disk.
Your application must be secured so that a user could not access other directories. The easiest way to prevent an attack is to check strings for dot-dot-slash sequences. Unfortunately, that's not enough to ensure complete security.
Vulnerable Code Example
In this scenario, user input is directly concatenated with a base directory path without validation, leading to a basic path traversal vulnerability:
Attack Example
By accessing the endpoint /vuln?file=../../etc/passwd
, an attacker can exploit the vulnerability to expose sensitive files like /etc/passwd
.
Prevention Code
To mitigate Relative Path Traversal vulnerabilities, the following secure approach can be implemented:
Key Prevention Measures:
Path Sanitization: By using
path.basename()
, only the filename is retained, discarding any path components that could lead to directory traversal.Secure Path Construction:
path.join()
ensures that the constructed path is relative to the intended directory, eliminating the risk of accessing unauthorized files.
Absolute Path Traversal
An absolute path traversal attack is easier to perform. Let's say we use the following JavaScript code to process a user's request:
In this example, although the application tries to block ../, it may still be vulnerable, You might be able to use an absolute path from the filesystem root, such as :
to directly reference a file without using any traversal sequences.
Prevention Code
To mitigate Relative Path Traversal vulnerabilities, the following secure approach can be implemented:
Traversal Sequences Stripped Non-Recursivel
This version demonstrates how a server might attempt to mitigate path traversal attacks by removing traversal sequences like ../
, but only non-recursively, which means only the first occurrence will be stripped:
While this approach removes one occurrence of a traversal sequence (../
), attackers could craft input with multiple instances of the sequence, such as ....//....//.../
, which may still allow access to restricted files if the server doesn’t repeatedly sanitize or check for further sequences.
Example Attack:
An attacker might pass the filename as ....//....//etc/passwd
. While one ../
is stripped, the remaining traversal sequence (....//....//
) could still resolve to a directory outside the intended path, allowing access to sensitive files like /etc/passwd
Solution: Recursive or Multiple Layer Sanitization
Instead of stripping traversal sequences just once, you could recursively sanitize the filename or employ more comprehensive validation checks. Additionally, regular expressions like the one in your code can be expanded to account for various other attack vectors.
File Path Traversal with URL Encoding or Double Encoding
If a server strips directory traversal sequences like ../
but does so in a non-recursive and simplistic manner, attackers may exploit the URL encoding mechanism to bypass this defense.
For example:
../
can be URL-encoded as%2e%2e%2f
.Double URL-encoded traversal like
..%c0%af
or..%ef%bc%8f
could also bypass some basic sanitization mechanisms.
If the application only strips ../
but doesn't account for URL encoding or double encoding, attackers could craft a payload like:
../../../../../etc/passwd
encoded as%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/passwd
.
Validation of Path Start
Another defense is to check if the provided filename starts with a specific base folder (e.g., /var/www/images
). However, this can be bypassed if attackers include the base folder followed by traversal sequences, such as:
filename=/var/www/images/../../../etc/passwd.
Even though the filename might start with the correct base folder, the traversal sequences allow access to arbitrary paths outside of the intended directory.
The application would only check the start of the path, so the request would be accepted as valid, even though it leads outside the allowed directory.
File Path Traversal with Validation of File Extension and Null Byte Bypass
Some applications validate the file extension (e.g., .png
) to restrict access to specific file types. However, attackers can bypass this restriction by injecting a null byte (%00
) after the filename, effectively truncating the file path and allowing access to sensitive files.
Example:
filename=../../../etc/passwd%00.png
The null byte (%00
) terminates the string after etc/passwd
, so the application will read the file as ../../../etc/passwd
, bypassing the .png
extension check.
How to prevent a path traversal attack
The most effective way to prevent path traversal vulnerabilities is to avoid passing user-supplied input to filesystem APIs altogether. Many application functions that do this can be rewritten to deliver the same behavior in a safer way.
If you can’t avoid passing user-supplied input to filesystem APIs, we recommend using two layers of defense to prevent attacks:
Validate User Input:
Always validate user input before processing it. This can be achieved by allowing only expected values or characters in the input. A whitelist approach is ideal, where the input is compared against a predefined list of safe values. If a whitelist isn't feasible, use a regular expression to ensure the input contains only safe characters, such as alphanumeric characters.
Canonicalize the Path:
After validation, append the input to the base directory and use the filesystem API to canonicalize the path. This step resolves any symbolic links, redundant separators, or references to parent directories (e.g.,
..
). It ensures the resulting path is an absolute, unique representation that can't escape the intended directory structure.
Verify the Path:
Verify that the canonicalized path starts with the expected base directory. This ensures that the final path resides within the intended directory and prevents unauthorized access to other locations.
Node.js Example for Preventing Path Traversal:Below is a Node.js code example demonstrating how to prevent path traversal attacks using these principles:
in this code:
validateInput
function validates the user input. You can customize this function according to your requirements.processInput
function processes the user input by appending it to the base directory, canonicalizing the path, and verifying that the canonical path starts with the expected base directory.If any validation or verification fails, an error is thrown, preventing a potential path traversal attack.
Ensure to replace
/path/to/base/directory
with the actual base directory in your application.
Remember that this is a basic example. Depending on specific use case and requirements, you may need to enhance the validation and error handling logic. Additionally, consider implementing additional security measures such as access controls and permissions to further mitigate risks.
Lab 1 : File path traversal, simple case
Link to lab1: https://portswigger.net/web-security/file-path-traversal/lab-simple
Aim: Read content of /etc/passwd
Click Access the lab
Website will launch on new tab where we will practice.
Then run burpsuite.
In burpsuite under HTTP history
, click on filter
and select images
and css
Then reload the lab.
In the HTTP history, we can see filename
parameter is loading various images, we will use one of these request , change the parameter and send the changed request to server.
Select any one of the request, right click and send it to repeater (or CTRL + R)
Our aim is to read the content of /etc/passwd
,but we don’t know the current location of the files filename
parameter is fetching from.
So we will use ../
which is used to move one directory up.
For example.
If we are currently in /var/www/images
folder then command ../
will move us one directory up into /var/www/
and multiple ../
will move us multiple directory up.
../../../../../../../../../../../../
will move us to root directory.
../../../../../etc/passwd
will move to 5 directory up and then go to /etc/passwd
. Thus loading the content of the passwd file.
Lab 1 completed successfully.
Lab 2 : File path traversal, traversal sequences blocked with absolute path bypass
link to lab2: https://portswigger.net/web-security/file-path-traversal/lab-absolute-path-bypass
Same as before intercept the request and send it to repeater. For this lab traversal sequences is blocked but we can bypass this by providing absolute path.
By providing absolute path /etc/passwd
we can successfully complet the lab.
Lab 3 : File path traversal, traversal sequences stripped non-recursively
link to lab: https://portswigger.net/web-security/file-path-traversal/lab-sequences-stripped-non-recursively
Same as before, send the interesting request to repeater.
In this lab , there is some kind of filter/ sanitization which is stripping or removing the traversal sequence.
We can bypass this stripping easily by:
by adding extra ../
in between the payload we can bypass this filter.
Note this will not work in recursive stripping process.
Lab 4 : File path traversal, traversal sequences stripped with superfluous URL-decode
link to lab 4: https://portswigger.net/web-security/file-path-traversal/lab-superfluous-url-decode
Previous method not working. We can come around this time by url encoding the payload .
By double url encoding ../../../../../../etc/passwd
we can complete the lab.
Lab 5 : File path traversal, validation of start of path
link to lab5: https://portswigger.net/web-security/file-path-traversal/lab-validate-start-of-path
An application may require the user-supplied filename to start with the expected base folder, such as /var/www/images
. In this case, it might be possible to include the required base folder followed by suitable traversal sequences. For example:
Lab 6 : File path traversal, validation of file extension with null byte bypass
link to lab: https://portswigger.net/web-security/file-path-traversal/lab-validate-file-extension-null-byte-bypass
An application may require the user-supplied filename to end with an expected file extension, such as .png
. In this case, it might be possible to use a null byte to effectively terminate the file path before the required extension. For example:
filename=../../../etc/passwd%00.png
everything after null byte %00 is ignored while fetching the file.
Which completes the lab.
Last updated