National Institute of Standards and Technology
Package illustrating a test case

Test case 157007

Description

The system or application is vulnerable to file system contents
disclosure through path equivalence. Path equivalence involves the
use of special characters in file and directory names. The associated
manipulations are intended to generate multiple names for the same
object. This test will accept input of a file to read, but prohibits access
to file in the /etc directory. The input generates an equivalent name
/////etc/////passwd which bypasses the filter.
Metadata
- Base program: Apache POI
- Source Taint: SOCKET
- Data Type: VOID_POINTER
- Data Flow: JAVA_GENERICS
- Control Flow: FUNCTION_INVOCATION_OVERLOAD

Flaws

Test Suites

Documentation

Have any comments on this test case? Please, send us an email.