A Simple and Intuitive Algorithm for Preventing Directory Traversal Attacks

08/13/2019
by   Michael Flanders, et al.
0

With web applications becoming a preferred method of presenting graphical user interfaces to users, software vulnerabilities affecting web applications are becoming more and more prevalent and devastating. Some of these vulnerabilities, such as directory traversal attacks, have varying defense mechanisms and mitigations that can be difficult to understand, analyze, and test. Gaps in the testing of these directory traversal defense mechanisms can lead to vulnerabilities that allow attackers to read sensitive data from files or even execute malicious code. This paper presents an analysis of some currently used directory traversal attack defenses and presents a new, stack-based algorithm to help prevent these attacks by safely canonicalizing user-supplied path strings. The goal of this algorithm is to be small, easy to test, cross-platform compatible, and above all, intuitive. We provide a proof of correctness and verification strategies using symbolic execution for the algorithm. We hope that the algorithm is simple and effective enough to help move developers towards a unified defense against directory traversal attacks.

READ FULL TEXT

page 2

page 3

research
12/17/2020

Understanding The Top 10 OWASP Vulnerabilities

Understanding the common vulnerabilities in web applications help busine...
research
09/30/2018

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

The proliferation of web applications has essentially transformed modern...
research
04/08/2021

Adversarial Learning Inspired Emerging Side-Channel Attacks and Defenses

Evolving attacks on the vulnerabilities of the computing systems demand ...
research
05/12/2021

SoK: Practical Foundations for Spectre Defenses

Spectre vulnerabilities violate our fundamental assumptions about archit...
research
01/14/2019

BlackWatch: Increasing Attack Awareness Within Web Applications

Web applications are relied upon by many for the services they provide. ...
research
05/17/2022

Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey

Cross-site scripting (XSS) is one of the major threats menacing the priv...
research
12/24/2020

SoK: Lending Pools in Decentralized Finance

Lending pools are decentralized applications which allow mutually untrus...

Please sign up or login with your details

Forgot password? Click here to reset