Known Exploited Vulnerabilities Directory Traversal (Relative and Absolute) Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2023-35081 Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This vulnerability is exploited through a path traversal flaw in Ivanti EPMM. Attackers initiate this vulnerability by leveraging authenticated administrative access to remotely write arbitrary files onto the server. This enables them to deploy additional payloads, potentially granting further access and compromising the system. This vulnerability is often used in conjunction with CVE-2023-35078 (along with others) that provides unauthenticated access, enhancing the attack's capabilities. It has been actively exploited, impacting victims by leveraging both vulnerabilities together.
References
CVE-2023-35081 Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
This vulnerability is exploited through a path traversal flaw in Ivanti EPMM. Attackers initiate this vulnerability by leveraging authenticated administrative access to remotely write arbitrary files onto the server. This enables them to deploy additional payloads, potentially granting further access and compromising the system.
References
CVE-2023-32315 Ignite Realtime Openfire Path Traversal Vulnerability secondary_impact T1087.002 Domain Account
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
CVE-2023-32315 Ignite Realtime Openfire Path Traversal Vulnerability exploitation_technique T1202 Indirect Command Execution
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
CVE-2023-32315 Ignite Realtime Openfire Path Traversal Vulnerability secondary_impact T1496 Resource Hijacking
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
CVE-2023-32315 Ignite Realtime Openfire Path Traversal Vulnerability primary_impact T1505.003 Web Shell
Comments
CVE-2023-32315 is a path traversal bug in Openfire's administrative console that could be leveraged for remote code execution. Public reports have indicated that threat actors were exploiting this vulnerability to gain access to the Openfire plugins interface to create new admin console user accounts, install a malicious plugin, and gain access to a webshell.
References
CVE-2022-41328 Fortinet FortiOS Path Traversal Vulnerability secondary_impact T1049 System Network Connections Discovery
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
CVE-2022-41328 Fortinet FortiOS Path Traversal Vulnerability secondary_impact T1565.001 Stored Data Manipulation
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
CVE-2022-41328 Fortinet FortiOS Path Traversal Vulnerability primary_impact T1037 Boot or Logon Initialization Scripts
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
CVE-2022-41328 Fortinet FortiOS Path Traversal Vulnerability exploitation_technique T1574 Hijack Execution Flow
Comments
CVE-2022-41328 is a path traversal vulnerability that allows a privileged attacked to read and write to files on the underlying Linux system via crafted CLI commands. Adversaries have been observed modifying files that establish persistence upon boot. The malicious files provide the adversaries with the capabilities of: data exfiltration, download/write files, remote shell, and discovery of network connections.
References
CVE-2021-42013 Apache HTTP Server Path Traversal Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-42013 was introduced as the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50. CVE-2021-42013 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
CVE-2021-42013 Apache HTTP Server Path Traversal Vulnerability exploitation_technique T1210 Exploitation of Remote Services
Comments
CVE-2021-42013 was introduced as the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50. CVE-2021-42013 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
CVE-2021-41773 Apache HTTP Server Path Traversal Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2021-41773 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
CVE-2021-41773 Apache HTTP Server Path Traversal Vulnerability exploitation_technique T1210 Exploitation of Remote Services
Comments
CVE-2021-41773 is a path traversal vulnerability in Apache HTTP Server 2.4.49 that allows an attacker to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied," these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution.
References
CVE-2020-3452 Cisco ASA and FTD Read-Only Path Traversal Vulnerability exploitation_technique T1202 Indirect Command Execution
Comments
CVE-2020-3452 is a vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.
References
CVE-2020-3452 Cisco ASA and FTD Read-Only Path Traversal Vulnerability primary_impact T1005 Data from Local System
Comments
CVE-2020-3452 is a vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.
References
CVE-2019-3398 Atlassian Confluence Server and Data Center Path Traversal Vulnerability exploitation_technique T1202 Indirect Command Execution
Comments
CVE-2019-3398 is a path traversal vulnerability in Atlassian Confluence Server and Data Center that allows an authenticated attacker to write files to arbitrary locations, potentially leading to remote code execution
References
CVE-2019-3398 Atlassian Confluence Server and Data Center Path Traversal Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
CVE-2019-3398 is a path traversal vulnerability in Atlassian Confluence Server and Data Center that allows an authenticated attacker to write files to arbitrary locations, potentially leading to remote code execution
References
CVE-2018-13379 Fortinet FortiOS SSL VPN Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This is a path traversal vulnerability that allows adversary to download system files through specially-crafted HTTP requests.
References
CVE-2013-0629 Adobe ColdFusion Directory Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This is an exploitation of a public-facing server due to password misconfiguration. Exploitation allows attackers to access restricted directories.
References
CVE-2013-0629 Adobe ColdFusion Directory Traversal Vulnerability primary_impact T1202 Indirect Command Execution
Comments
This is an exploitation of a public-facing server due to password misconfiguration. Exploitation allows attackers to access restricted directories
References
CVE-2013-0629 Adobe ColdFusion Directory Traversal Vulnerability secondary_impact T1005 Data from Local System
Comments
This is an exploitation of a public-facing server due to password misconfiguration. Exploitation allows attackers to access restricted directories
References
CVE-2010-2861 Adobe ColdFusion Directory Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This is the exploitation of a public facing server. In-the-wild reporting documents that exploitation of this vulnerability was used to install a webshell on the victim machine, and then captured and exfiltrated client credit card information.
References
CVE-2010-2861 Adobe ColdFusion Directory Traversal Vulnerability secondary_impact T1119 Automated Collection
Comments
This is the exploitation of a public facing server. In-the-wild reporting documents that exploitation of this vulnerability was used to install a webshell on the victim machine, and then captured and exfiltrated client credit card information.
References
CVE-2010-2861 Adobe ColdFusion Directory Traversal Vulnerability primary_impact T1105 Ingress Tool Transfer
Comments
This is the exploitation of a public facing server. In-the-wild reporting documents that exploitation of this vulnerability was used to install a webshell on the victim machine, and then captured and exfiltrated client credit card information.
References
CVE-2024-57727 SimpleHelp Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
CVE-2024-57727 SimpleHelp Path Traversal Vulnerability primary_impact T1552.001 Credentials In Files
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
CVE-2024-57727 SimpleHelp Path Traversal Vulnerability primary_impact T1552.004 Private Keys
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
CVE-2024-57727 SimpleHelp Path Traversal Vulnerability primary_impact T1003 OS Credential Dumping
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
CVE-2024-57727 SimpleHelp Path Traversal Vulnerability secondary_impact T1059 Command and Scripting Interpreter
Comments
Due to improper handling of HTTP request input, attackers can exploit a path traversal vulnerability in SimpleHelp version 5.5.7 and prior to gain access to critical user data stored in SimpleHelp, such as credentials. From there, with the credentials, they can further compromise the system, such as with code execution.
References
CVE-2024-55550 Mitel MiCollab Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
Due to improper input sanitization, a user with administrative credentials can access and read arbitrary files on the MiCollab server.
References
CVE-2024-55550 Mitel MiCollab Path Traversal Vulnerability primary_impact T1005 Data from Local System
Comments
Due to improper input sanitization, a user with administrative credentials can access and read arbitrary files on the MiCollab server.
References
CVE-2024-55550 Mitel MiCollab Path Traversal Vulnerability secondary_impact T1041 Exfiltration Over C2 Channel
Comments
Due to improper input sanitization, a user with administrative credentials can access and read arbitrary files on the MiCollab server. That data can then be exfiltrated.
References
CVE-2024-4885 Progress WhatsUp Gold Path Traversal Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
By sending a crafted payload to a vulnerable WhatsUp Gold server, an attacker can conduct a path traversal attack and write malicious files onto the server. This leads to high-privileged remote code execution.
References
CVE-2024-4885 Progress WhatsUp Gold Path Traversal Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
By sending a crafted payload to a vulnerable WhatsUp Gold server, an attacker can conduct a path traversal attack and write malicious files onto the server. This leads to high-privileged remote code execution.
References
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
An unauthenticated attacker can send a request to the NAKIVO Backup & Replication endpoint that contains a path to a sensitive file, leading to arbitrary file read.
References
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability primary_impact T1005 Data from Local System
Comments
An unauthenticated attacker can send a request to the NAKIVO Backup & Replication endpoint that contains a path to a sensitive file, leading to arbitrary file read.
References
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability secondary_impact T1003 OS Credential Dumping
Comments
An unauthenticated attacker can send a request to the NAKIVO Backup & Replication endpoint that contains a path to a sensitive file, leading to arbitrary file read.
References
CVE-2024-41713 Mitel MiCollab Path Traversal Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
This path traversal vulnerability can lead to privilege escalation on MiCollab, which can then lead to other exploits such as CVE-2024-55550.
References
CVE-2024-41713 Mitel MiCollab Path Traversal Vulnerability primary_impact T1005 Data from Local System
Comments
This path traversal vulnerability can lead to privilege escalation on MiCollab, which can then lead to other exploits such as CVE-2024-55550.
References
CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability exploitation_technique T1558 Steal or Forge Kerberos Tickets
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability primary_impact T1550.002 Pass the Hash
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability secondary_impact T1087 Account Discovery
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability exploitation_technique T1558 Steal or Forge Kerberos Tickets
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability primary_impact T1550.002 Pass the Hash
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability secondary_impact T1087 Account Discovery
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability exploitation_technique T1558 Steal or Forge Kerberos Tickets
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability primary_impact T1550.002 Pass the Hash
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability secondary_impact T1087 Account Discovery
Comments
An attacker can exploit this vulnerability to coerce credential relay attacks and gain access to sensitive information.
References
CVE-2024-0769 D-Link DIR-859 Router Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This path traversal vulnerability in D-Link DIR-859 WiFi routers can lead to information disclosure, such as configuration files. As these devices are end-of-life, the manufacturer has no intention of patching this.
References
CVE-2024-0769 D-Link DIR-859 Router Path Traversal Vulnerability primary_impact T1005 Data from Local System
Comments
This path traversal vulnerability in D-Link DIR-859 WiFi routers can lead to information disclosure, such as configuration files. As these devices are end-of-life, the manufacturer has no intention of patching this.
References
CVE-2023-38950 ZKTeco BioTime Path Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
This directory traversal vulnerability, if exploited using a malicious payload in an HTTP GET request, allows an unauthenticated attacker to access and read arbitrary files, leading to potential exfiltration/disclosure.
References
CVE-2023-38950 ZKTeco BioTime Path Traversal Vulnerability primary_impact T1005 Data from Local System
Comments
This directory traversal vulnerability, if exploited using a malicious payload in an HTTP GET request, allows an unauthenticated attacker to access and read arbitrary files, leading to potential exfiltration/disclosure.
References
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability exploitation_technique T1190 Exploit Public-Facing Application
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability primary_impact T1083 File and Directory Discovery
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability secondary_impact T1592 Gather Victim Host Information
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability secondary_impact T1555 Credentials from Password Stores
Comments
By exploiting this vulnerability in SAP Netweaver Java, the attacker can inject directory traversal commands, allowing for navigation of the file system beyond intended access. This can additionally lead to the discovery of password stores, as well as information about the host system, providing information that can be used in further attacks.
References
CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability primary_impact T1059 Command and Scripting Interpreter
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability secondary_impact T1496 Resource Hijacking
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References
CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability secondary_impact T1608.001 Upload Malware
Comments
By exploiting a path traversal vulnerability in Samsung MagicINFO 9 Server, an unauthenticated attacker can write arbitrary files with system privileges. This can be used to deploy malware or to hijack resources for activity such as cryptocurrency mining.
References

Capabilities

Capability ID Capability Name Number of Mappings
CVE-2024-4885 Progress WhatsUp Gold Path Traversal Vulnerability 2
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability 4
CVE-2021-41773 Apache HTTP Server Path Traversal Vulnerability 2
CVE-2010-2861 Adobe ColdFusion Directory Traversal Vulnerability 3
CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability 4
CVE-2021-42013 Apache HTTP Server Path Traversal Vulnerability 2
CVE-2023-35081 Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability 2
CVE-2023-38950 ZKTeco BioTime Path Traversal Vulnerability 2
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability 3
CVE-2019-3398 Atlassian Confluence Server and Data Center Path Traversal Vulnerability 2
CVE-2018-13379 Fortinet FortiOS SSL VPN Path Traversal Vulnerability 1
CVE-2020-3452 Cisco ASA and FTD Read-Only Path Traversal Vulnerability 2
CVE-2024-0769 D-Link DIR-859 Router Path Traversal Vulnerability 2
CVE-2024-13160 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability 4
CVE-2013-0629 Adobe ColdFusion Directory Traversal Vulnerability 3
CVE-2024-13159 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability 4
CVE-2022-41328 Fortinet FortiOS Path Traversal Vulnerability 4
CVE-2024-41713 Mitel MiCollab Path Traversal Vulnerability 2
CVE-2024-57727 SimpleHelp Path Traversal Vulnerability 5
CVE-2024-13161 Ivanti Endpoint Manager (EPM) Absolute Path Traversal Vulnerability 4
CVE-2024-55550 Mitel MiCollab Path Traversal Vulnerability 3
CVE-2023-32315 Ignite Realtime Openfire Path Traversal Vulnerability 4