No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Web Applications |
Advisory ID: |
ngCERT-2025-010014 |
Version: |
N/A |
CVE: |
N/A |
Published: |
May 28, 2025 |
ngCERT is aware of a critical vulnerability referred to as Directory Traversal vulnerability. Directory Traversal also known as Path traversal or directory climbing, is a web application server flaw that enables attackers to gain unauthorized access to files and directories on a server by manipulating file paths. This flaw arises from weak input validation, which allows attackers to navigate outside the designated directory structure. The severity of the impact can vary, however, it often results in significant consequences such as data breaches or unauthorised system access. Additionally, following best practices like regular vulnerability testing, code audits, and implementing access control is essential for preventing exploitation.
Directory Traversal is a security vulnerability in web application servers caused by an HTTP exploit. It occurs due to weak input validation or insecure file-handling practices. This flaw allows an attacker to manipulate file paths, gaining access to directories and files outside the designated directory structure on a web server. Malicious attackers exploit this vulnerability by manipulating URL paths or parameters through the server’s file system by taking advantage of sequences like “../” (Unix) or “..\” (Windows) and retrieve sensitive information, such as configuration or password files, or other critical data. Directory Traversal can lead to the exposure of sensitive system or application details, unauthorized access to restricted files, and the potential for further attacks that compromise the server or other connected systems.
Falling prey to these attacks could potentially lead to:
ngCERT recommends the following: