Path Traversal vulnerabilities in Go applications occur when user input is concatenated with a string to form a path to access filesystem objects without proper validation and authorization checks. This lab offers hands-on experience testing for Path Traversal vulnerabilities and implementing suitable mitigations. Potential mitigations include resolving path traversal characters, removing extraneous duplicate characters, resolving embedded environment variables, and anchoring to a fixed location. The virtual environment provides a vulnerable application and its complete source code for developers to identify and remediate Path Traversal vulnerabilities effectively, preventing unauthorized access to filesystem objects and ensuring application integrity and security.
After completing this lab, the learner will understand how to defend Go applications against Path Traversal vulnerabilities by receiving hands-on experience testing for these vulnerabilities and implementing appropriate mitigation.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.