Directory Traversal (also known as Path Traversal) is a security vulnerability in web applications that allows an attacker to access files or directories outside the intended directory. The attacker manipulates file paths to navigate through the server’s filesystem.
A vulnerable web application often processes file paths directly from user input, such as an URL:
https://example.com/getFile?file=report.pdf
If the server does not properly validate the input, an attacker could modify it like this:
https://example.com/getFile?file=../../../../etc/passwd
Here, the attacker uses ../
(parent directory notation) to move up the directory structure and access system files like /etc/passwd
(on Linux).
CORS (Cross-Origin Resource Sharing) is a security mechanism implemented by web browsers to control which websites can access resources from other domains. By default, browsers block cross-origin requests—requests made from one website to another domain, protocol, or port—for security reasons.
Without CORS, malicious websites could secretly send requests to other servers (e.g., API servers or banking sites), potentially stealing or misusing sensitive data (Cross-Site Request Forgery, CSRF). CORS ensures that only explicitly allowed websites can access resources.
When a web application makes a cross-origin request (e.g., from http://example.com
to https://api.example.com
), the browser automatically sends a CORS request. The server must then respond with specific HTTP headers to indicate whether the request is allowed:
Without CORS headers:
The browser blocks the request.
With CORS headers:
The server can respond with Access-Control-Allow-Origin: *
(allowing all domains) or a specific domain (Access-Control-Allow-Origin: https://example.com
). This enables access.
For certain requests (e.g., PUT
, DELETE
, or requests with custom headers), the browser sends a preflight request using the OPTIONS
method. The server must respond with the correct CORS headers to allow the main request.
CORS is a crucial security measure that prevents unauthorized websites from accessing foreign resources. Developers must configure the correct server-side headers to allow legitimate clients to access the data.
Remote Code Execution (RCE) is a severe security vulnerability where an attacker can execute malicious code on a remote computer or server. This can happen when a system has software vulnerabilities that allow an attacker to inject and execute arbitrary code. RCE attacks can have serious consequences because they can give the attacker control over the affected system.
How does Remote Code Execution work?
RCE occurs when an attacker exploits vulnerabilities in an application, operating system, or network component to inject and execute code on the system. These vulnerabilities can be found in various parts of an application, such as:
Example of an RCE Attack:
A common example is an insecure web application that does not properly validate user inputs. If an attacker inputs malicious code into a form field and the application processes this input without proper validation, the code can be executed on the server.
# A simple example in Python
import os
def execute_command(user_input):
os.system(user_input)
# Attacker inputs: "ls; rm -rf /"
execute_command("ls; rm -rf /")
Potential Impacts of RCE:
Mitigation Measures against RCE:
By implementing these measures, the risk of an RCE attack can be significantly reduced.
Server Side Includes (SSI) Injection is a security vulnerability that occurs in web applications that use Server Side Includes (SSI). SSI is a technique allowing HTML files to be dynamically generated on the server by embedding special commands within HTML comments. These commands are interpreted and executed by the web server before the page is delivered to the client.
How does SSI Injection work?
In an SSI Injection attack, an attacker injects malicious SSI commands into input fields, URLs, or other mechanisms through which the application accepts user data. If the application does not properly validate and filter these inputs, the injected commands can be executed on the server.
Example of an SSI command:
<!--#exec cmd="ls"-->
This command would list the contents of the current directory on a vulnerable server.
Potential impacts of SSI Injection:
Mitigation measures against SSI Injection:
By implementing these measures, the risk of SSI Injection can be significantly reduced.
A web application firewall (WAF) is a security solution that has been specially developed to protect web applications. It monitors traffic between web browsers and web applications to detect and block potentially harmful or unwanted activity. Essentially, a WAF acts as a shield that protects web applications from a variety of attacks, including