What is path traversal?

Path traversal, also known as directory traversal or path traversal attack, is a type of security attack in which an attacker attempts to access files and directories that are outside the web application's assigned directory. The attacker manipulates the path information in the requests to the web application in order to gain access to sensitive files or directories that they should not normally have access to.

Example of path traversal attacks

An example of path traversal is when a web application does not adequately validate user input and an attacker attempts to access the server's password file by typing example.com/page.php?file=../.. /etc/passwd. By using "../" the attacker attempts to work their way back through the directories to access files outside of the web directory.

Path traversal attacks can cause serious security problems because a successful attack can allow an attacker to expose sensitive information such as passwords, configuration files, or sensitive user data. To protect against path traversal attacks, web applications should ensure that all user input is properly validated and sanitized to ensure that requests do not allow unauthorized file paths or directory structures. In addition, Web Application Firewalls (WAFs) such as the Airlock Gateway can be used to monitor suspicious traffic and detect and block attacks early.

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge