
Sign up to save your podcasts
Or
Edward Henriquez's podcast script for Decoded: The Cybersecurity Podcast explains the Path Traversal vulnerability from a hacker's perspective. This technique exploits weaknesses in web applications that allow users to specify file paths. By manipulating these paths with sequences like "../", attackers can navigate outside intended directories to access sensitive files such as configuration files, source code, and SSH keys. Henriquez also describes advanced methods to bypass common defenses, like double encoding and null byte injection. The script uses a real-world example of a GitHub Enterprise vulnerability to illustrate the impact and emphasizes that trusting user-supplied file paths is the root cause. Finally, it provides concrete defense strategies for developers, including input sanitization, path normalization, and restricting file access.
Patreon Support:
https://www.patreon.com/DecodedPodcast
4.8
44 ratings
Edward Henriquez's podcast script for Decoded: The Cybersecurity Podcast explains the Path Traversal vulnerability from a hacker's perspective. This technique exploits weaknesses in web applications that allow users to specify file paths. By manipulating these paths with sequences like "../", attackers can navigate outside intended directories to access sensitive files such as configuration files, source code, and SSH keys. Henriquez also describes advanced methods to bypass common defenses, like double encoding and null byte injection. The script uses a real-world example of a GitHub Enterprise vulnerability to illustrate the impact and emphasizes that trusting user-supplied file paths is the root cause. Finally, it provides concrete defense strategies for developers, including input sanitization, path normalization, and restricting file access.
Patreon Support:
https://www.patreon.com/DecodedPodcast
1,072 Listeners
163 Listeners
1,018 Listeners
137 Listeners
405 Listeners
7,951 Listeners
129 Listeners
13 Listeners
30 Listeners
513 Listeners
18 Listeners
0 Listeners