Skip to content

Security Test: Directory traversal

Description

Default Severity:

Directory traversal allows an attacker to manipulate file paths so that they’re able to access files outside the intended directory. It happens when a web application doesn’t properly check or sanitize file path inputs, which means an attacker can trick it into revealing sensitive files like configuration or system information. This is dangerous because it can expose details that could be used to further penetrate the system or compromise data. Developers often make the mistake of assuming input is safe, which is why it's important to validate and restrict what file paths can be accessed.

Reference:

Configuration

Identifier: injection/directory_traversal

Examples

All configuration available:

checks:
  injection/directory_traversal:
    skip: false # default
    options:
      skip_objects: # cf. Options below

Options

Options can be set in the options key of the Security Test Configuration.

Property Type Default Description
skip_objects List[string] List of object that are to be skipped by the security test.

Compliance and Standards

Standard Value
OWASP API Top 10 API10:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 6.5.1
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.14.2
NIST SP800-53
FedRAMP AC-6
CWE 551
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
CVSS Score 7.2