This vulnerability occurs when an application accepts file paths containing '/./' (single dot directory) sequences without proper validation. Attackers can exploit this to bypass intended directory structures, potentially accessing sensitive files or navigating to unauthorized locations within the file system.
The '/./' sequence, while technically valid in some filesystems, represents the current directory. When an application doesn't normalize or validate these sequences, it creates ambiguous path resolution. An attacker can inject '/./' repeatedly to manipulate how the system interprets the final path, potentially escaping restricted directories or accessing files outside the intended scope. To prevent this, developers should implement strict path validation that resolves all dot directory sequences before processing. Use canonical path functions provided by your programming language to normalize paths, and enforce a whitelist of allowed directories. Never trust user-supplied paths directly—always validate them against a known safe base directory.
Impact: Read Files or DirectoriesModify Files or Directories
Strategy: Input Validation