Path Equivalence: 'file...name' (Multiple Internal Dot)

Incomplete Variant
Structure: Simple
Description

This vulnerability occurs when an application accepts file paths containing sequences of multiple internal dots (like 'file...name') without proper validation. Attackers can exploit this ambiguity to bypass security checks, traverse directories, and access sensitive files or system areas they shouldn't be able to reach.

Extended Description

Path traversal attacks often rely on tricking the system's path resolution logic. When an application fails to normalize or validate sequences like '...' within a path, different operating systems or parsers may interpret them differently. Some might collapse them into a parent directory reference ('..'), allowing an attacker to climb out of the intended directory and access arbitrary files elsewhere on the server. To prevent this, developers must implement strict input validation and canonicalize all user-supplied paths before use. This means converting paths to their absolute, simplest form and checking that the final resolved path stays within the explicitly allowed directory. Relying on a deny-list of 'bad' patterns is insufficient; instead, use an allow-list of permitted characters and a robust path normalization library specific to your operating system.

Common Consequences 1
Scope: ConfidentialityIntegrity

Impact: Read Files or DirectoriesModify Files or Directories

Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Modes of Introduction
Implementation
Functional Areas
  1. File Processing
Affected Resources
  1. File or Directory
Taxonomy Mapping
  • PLOVER
  • Software Fault Patterns
Notes
RelationshipAn improper attempt to remove the internal dots from the string could lead to Incorrect Behavior Order: Validate Before Filter (Incorrect Behavior Order: Validate Before Filter).