RULE(RULE ID:205125)

Rule General Information
Release Date: 2024-01-04
Rule Name: Directory Traversal Detection - FTP Session
Severity:
CVE ID:
Rule Protection Details
Description: The directory traversal vulnerability exploits Web applications to exploit operating system relative path jump characters such as... /) Lack of filtering issues resulting in directory traversal that can lead to arbitrary file access. This rule is used to detect suspicious directory traversal symbols in FTP sessions.
Impact: Through directory traversal attacks, an attacker can cause directory traversal, which may lead to any file access or upload.
Affected OS: Windows, Linux
Reference: SecurityFocusBID:12160
CVE-2004-1376
ExploitDB:16105
Solutions
1. Filter or escape the path entered by the user to ensure that the input does not contain special characters or path separators. 2. Standardize the file path entered by the user to ensure that the path conforms to the expected format and structure. 3. ensure that the file system permissions of Web servers and applications are set properly, and restrict access to sensitive files and directories.