What is an HTTP exploit that allows attackers to access restricted directories and execute commands outside of the root directory of the web server?
- XSS
- web redirection
- directory traversal
- HTTP 302 cushioning
- iFrames
Explanation & Hint:
The HTTP exploit that allows attackers to access restricted directories and execute commands outside of the root directory of the web server is known as “directory traversal.” This type of attack exploits insufficient security validation or sanitization of user-supplied file names, enabling attackers to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and similar constructs, attackers can move up the directory hierarchy and access files or directories that should be inaccessible from the web. This can lead to information disclosure, website defacement, or server compromise. The other options mentioned serve different purposes:
|