2022-07-26 15:09:13 +02:00
|
|
|
=== What is the potential impact?
|
|
|
|
|
2022-09-13 16:27:19 +02:00
|
|
|
A web application is vulnerable to path injection and an attacker is able to
|
|
|
|
exploit it.
|
2022-07-26 15:09:13 +02:00
|
|
|
|
2022-09-13 16:27:19 +02:00
|
|
|
The files that can be affected are limited by the permission of the process
|
|
|
|
that runs the application. Worst case scenario: the process runs with root
|
|
|
|
privileges on Linux, and therefore any file can be affected.
|
2022-07-26 15:09:13 +02:00
|
|
|
|
2022-09-13 16:27:19 +02:00
|
|
|
Below are some real-world scenarios that illustrate some impacts of an attacker
|
|
|
|
exploiting the vulnerability.
|
2022-07-26 15:09:13 +02:00
|
|
|
|
|
|
|
==== Override or delete arbitrary files
|
|
|
|
|
2022-09-13 16:27:19 +02:00
|
|
|
The injected path component tampers with the location of a file the application
|
|
|
|
is supposed to delete or write into. The vulnerability is exploited to remove
|
|
|
|
or corrupt files that are critical for the application or for the system to
|
|
|
|
work properly.
|
|
|
|
|
2022-07-26 15:09:13 +02:00
|
|
|
It could result in data being lost or the application being unavailable.
|
|
|
|
|
|
|
|
==== Read arbitrary files
|
|
|
|
|
2022-09-13 16:27:19 +02:00
|
|
|
The injected path component tampers with the location of a file the application
|
|
|
|
is supposed to read and output. The vulnerability is exploited to leak the
|
|
|
|
content of arbitrary files from the file system, including sensitive files like
|
|
|
|
SSH private keys.
|
|
|
|
|