Data from request is passed to a file name $FILE. This is a path traversal vulnerability, which can lead to sensitive data being leaked. To mitigate, consider using os.path.abspath or os.path.realpath or the pathlib library. Likelihood: LOW Confidence: LOW CWE: - CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
OWASP: - A05:2017 - Broken Access Control
- A01:2021 - Broken Access Control
path-traversal-join
Data from request is passed to os.path.join() and to open(). This is a path traversal vulnerability, which can lead to sensitive data being leaked. To mitigate, consider using os.path.abspath or os.path.realpath or Path library. Likelihood: LOW Confidence: LOW CWE: - CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
OWASP: - A05:2017 - Broken Access Control
- A01:2021 - Broken Access Control
path-traversal-open
Found request data in a call to ‘open’. Ensure the request data is validated or sanitized, otherwise it could result in path traversal attacks and therefore sensitive data being leaked. To mitigate, consider using os.path.abspath or os.path.realpath or the pathlib library. Likelihood: MEDIUM Confidence: MEDIUM CWE: - CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
OWASP: - A05:2017 - Broken Access Control
- A01:2021 - Broken Access Control