This vulnerability occurs when an application builds file paths using user input without properly blocking absolute paths like '/etc/passwd' or 'C:\Windows\system32'. Attackers can exploit this to escape the intended directory and access sensitive files anywhere on the server.
Absolute path traversal happens because the application trusts user-supplied input when constructing filesystem paths, failing to validate or sanitize sequences that point to root directories. Unlike relative path traversals (using '..'), this attack uses full paths starting from the filesystem root, allowing direct access to critical system files, configuration files, or application source code outside the webroot. Preventing this requires validating all user input used in file operations, rejecting any path containing a leading slash or drive letter, and using canonicalization functions to resolve paths before checking if they remain within the allowed directory. While SAST tools can detect the vulnerable pattern, Plexicus uses AI to analyze the context and suggest the precise code fix—such as implementing an allowlist or path normalization—saving developers hours of manual security review and remediation.
Impact: Execute Unauthorized Code or Commands
The attacker may be able to create or overwrite critical files that are used to execute code, such as programs or libraries.
Impact: Modify Files or Directories
The attacker may be able to overwrite or create critical files, such as programs, libraries, or important data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, appending a new account at the end of a password file may allow an attacker to bypass authentication.
Impact: Read Files or Directories
The attacker may be able read the contents of unexpected files and expose sensitive data. If the targeted file is used for a security mechanism, then the attacker may be able to bypass that mechanism. For example, by reading a password file, the attacker could conduct brute force password guessing attacks in order to break into an account on the system.
Impact: DoS: Crash, Exit, or Restart
The attacker may be able to overwrite, delete, or corrupt unexpected critical files such as programs, libraries, or important data. This may prevent the product from working at all and in the case of a protection mechanisms such as authentication, it has the potential to lockout every user of the product.
Strategy: Input Validation
Effectiveness: High
Strategy: Input Validation
Strategy: Firewall
Effectiveness: Moderate
javapythonpython