z-logo
open-access-imgOpen Access
Deep Dive into Directory Traversal and File Inclusion Attacks leads to Privilege Escalation
Author(s) -
Mrunalsinh Chawda,
Priyanka Sharma,
Jatin Patel
Publication year - 2021
Publication title -
international journal of scientific research in science, engineering and technology
Language(s) - English
Resource type - Journals
eISSN - 2395-1990
pISSN - 2394-4099
DOI - 10.32628/ijsrset218384
Subject(s) - computer science , tree traversal , exploit , operating system , computer security , directory , code (set theory) , upload , programming language , set (abstract data type)
In Modern Web application directory traversal vulnerability that can potentially allow an attacker to view arbitrary files and some sensitive files. They can exploit identified vulnerabilities or misconfigurations to obtain root privileges. When building the web application, ensure that some arbitrary file is not publicly available via the production server. when an attacker can include. Traversal vulnerabilities this vulnerability exploits the dynamic file include a mechanism that exists in programming frameworks a local file inclusion happens when uncontrolled user input such as form values or headers for example are used to construct a file include paths. By exploiting directory traversal attacks in web servers, they can do anything and with chaining with code injection they can upload a shell into a web server and perform a website defacement attack. Path-traversal attacks take advantage of vulnerable Website parameters by including a URL reference to remotely hosted malicious code, allowing remote code execution and leads to privilege escalation attack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here