Description
Directory Traversal is a vulnerability which allows attackers to access restricted directories and execute commands outside of the web server's root directory.
The following programs are vulnerable.
Programs that publish files using WEBrick::HTTPServer.new with the :DocumentRoot option
Programs that publish files using WEBrick::HTTPServlet::FileHandler
Affected systems are:
1. Systems that accept backslash (\) as a path separator, such as Windows.
2. Systems that use case insensitive file-systems such as NTFS on Windows, HFS on Mac OS X.
Remediation
Your script should filter metacharacters from user input.
References
Related Vulnerabilities
WordPress 'paged' Parameter SQL Injection Vulnerability (2.0.2 - 2.0.5)
WordPress 4.0.x Multiple Vulnerabilities (4.0 - 4.0.15)
WordPress Plugin CSS Plus Multiple Unspecified Vulnerabilities (1.3.1)
WordPress Plugin Advanced Custom Fields Cross-Site Scripting (4.4.7)
WordPress Plugin DP Maintenance Mode Lite Cross-Site Scripting (1.3.2)