Skip to content

Add application-level path traversal section#825

Open
sudabg wants to merge 1 commit intoswisskyrepo:masterfrom
sudabg:add/application-level-path-traversal
Open

Add application-level path traversal section#825
sudabg wants to merge 1 commit intoswisskyrepo:masterfrom
sudabg:add/application-level-path-traversal

Conversation

@sudabg
Copy link
Copy Markdown

@sudabg sudabg commented Mar 16, 2026

Description

Added a new Application-Level Path Traversal section to Directory Traversal, covering common patterns where user-controlled input (session IDs, usernames, filenames) is used in filesystem operations without validation.

What's Added

  • Python vulnerable vs safe patterns (session store example)
  • Node.js path traversal with sendFile
  • Common attack vectors table
  • Detection guidance (what to grep for)

Motivation

The existing Directory Traversal section focuses on web/HTTP path traversal. This addition covers application-level path traversal — a common vulnerability in APIs and backend services where user input flows directly into filesystem operations like Path / user_input, shutil.rmtree(), os.path.join(), or res.sendFile().

The Python patterns are based on real fixes from production codebases.

Covers Python and Node.js path traversal in filesystem operations (session IDs, filenames, usernames) with vulnerable and safe code patterns.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant