Description
Directory Traversal is a vulnerability which allows attackers to access restricted directories and execute commands outside of the web server's root directory.
The following programs are vulnerable.
Programs that publish files using WEBrick::HTTPServer.new with the :DocumentRoot option
Programs that publish files using WEBrick::HTTPServlet::FileHandler
Affected systems are:
1. Systems that accept backslash (\) as a path separator, such as Windows.
2. Systems that use case insensitive file-systems such as NTFS on Windows, HFS on Mac OS X.
Remediation
Your script should filter metacharacters from user input.
References
Related Vulnerabilities
WordPress Plugin AgentEasy Properties Cross-Site Scripting (1.0.4)
Joomla! Core 2.5.x SQL Injection (2.5.0 - 2.5.1)
MySQL CVE-2016-0659 Vulnerability (CVE-2016-0659)
MySQL CVE-2020-2579 Vulnerability (CVE-2020-2579)
WordPress Plugin WordPress Infinite Scroll-Ajax Load More Directory Traversal (5.5.4)