CodeAnt AI home pagelight logodark logo
  • Support
  • Dashboard
  • Dashboard
  • Join Community
Start Here
  • What is CodeAnt?
Setup
  • Github
  • Bitbucket
  • Gitlab
  • Azure Devops
Pull Request Review
  • Features
  • Customize Review
  • Quality Gates
  • Integrations
Scan center
  • Code Security
  • Code Quality
  • Cloud Security
  • Engineering Productivity
Integrations
  • Jira
  • Test Coverage
  • CI/CD
IDE
  • Setup
  • Review
  • Enhancements
Rule Reference
  • Compliance
  • Anti-Patterns
  • Code Governance
  • Infrastructure Security Database
  • Application Security Database
    • Apex
    • Bash
    • C
    • Clojure
    • Cpp
    • Csharp
    • Dockerfile
    • Elixir
    • Fingerprints
    • Generic
    • Go
    • Html
    • Java
    • Javascript
      • Ajv
      • Angular
      • Apollo
      • Argon2
      • Audit
      • Aws-lambda
      • Axios
      • Bluebird
      • Browser
      • Chrome-remote-interface
      • Crypto
      • Deno
      • Express
        • Direct-response-write-with-header
        • Express-child-process
        • Express-fs-filename
          • Express fs filename
        • Express-sqlite-sqli
        • Mongodb
        • Mysql
        • Needle
        • Open-redirect-deepsemgrep
        • Pg
        • Redos
        • Regexp-redos
        • Request
        • Security
        • Security
        • Session-fixation
      • Fbjs
      • Firebase
      • Grpc
      • Intercom
      • Jose
      • Jquery
      • Jsonwebtoken
      • Jssha
      • Jwt-simple
      • Knex
      • Lang
      • Monaco-editor
      • Mongodb
      • Mongoose
      • Mssql
      • Mysql
      • Node-expat
      • Passport-jwt
      • Pg
      • Phantom
      • Playwright
      • Puppeteer
      • React
      • Sandbox
      • Sax
      • Sequelize
      • Serialize-javascript
      • Shelljs
      • Superagent
      • Thenify
      • Vm2
      • Vue
      • Wkhtmltoimage
      • Wkhtmltopdf
      • Xml2json
    • Json
    • Kotlin
    • Ocaml
    • Php
    • Problem-based-packs
    • Python
    • Ruby
    • Rust
    • Scala
    • Solidity
    • Swift
    • Terraform
    • Typescript
    • Yaml
Resources
  • Open Source
  • Blogs
Express-fs-filename

Express fs filename

express-fs-filename

The application builds a file path from potentially untrusted data, which can lead to a path traversal vulnerability. An attacker can manipulate the file path which the application uses to access files. If the application does not validate user input and sanitize file paths, sensitive files such as configuration or user data can be accessed, potentially creating or overwriting files. To prevent this vulnerability, validate and sanitize any input that is used to create references to file paths. Also, enforce strict file access controls. For example, choose privileges allowing public-facing applications to access only the required files.
Likelihood: HIGH
Confidence: MEDIUM
CWE:
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
OWASP:
- A05:2017 - Broken Access Control
- A01:2021 - Broken Access Control
Express child processExpress sqlite sqli
twitterlinkedin
Powered by Mintlify
Assistant
Responses are generated using AI and may contain mistakes.