This vulnerability occurs when an application accepts user input containing a Windows UNC share path (like '\\UNC\share\name') without proper validation, allowing attackers to redirect file operations to unintended network locations or arbitrary files.
Windows UNC (Universal Naming Convention) paths begin with double backslashes (\\), followed by a server name and share name, enabling network file access. When an application blindly trusts user input containing these paths, attackers can manipulate file reads, writes, or includes to target sensitive files on remote servers or internal network shares they shouldn't have access to. To prevent this, developers should treat UNC paths with the same suspicion as local file paths. Implement strict allow-lists of permitted directories, normalize paths before validation, and run applications with minimal network permissions. Always validate and sanitize user input that references file systems, whether local or networked.
Impact: Read Files or DirectoriesModify Files or Directories
Strategy: Input Validation
Effectiveness: High
Strategy: Input Validation