Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

FBI and CISA tell devs to crack down on security issues before releasing

A person's fingers type at a keyboard, with a digital security screen with a lock on it overlaid.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI), published a new joint security alert earlier this week, urging software developers to keep path traversal in mind when developing software products.

Path traversal is a software vulnerability also known as directory traversal, or directory climbing. By abusing this flaw, threat actors can access sensitive files and directories. The hole typically arises in web applications or systems that dynamically construct file paths based on user input without properly validating or sanitizing it. 

According to the two agencies, path traversal is a “persistent class of defect in software products”, despite it being well-documented and having effective elimination approaches, at scale, for more than two decades.

Demanding action

“Software manufacturers continue to put customers at risk by developing products that allow for directory traversal exploitation,” the alert reads, adding that threat actors are constantly abusing path traversal to target the healthcare and public health sectors. 

Right now, CISA has 55 path traversal vulnerabilities listed in the Known Exploited Vulnerabilities (KEV) catalog, signaling in-the-wild abuse.

“Approaches to avoid directory traversal vulnerabilities are known, yet threat actors continue to exploit these vulnerabilities which have impacted the operation of critical services, including hospital and school operations,” the alert further states. 

“CISA and the FBI urge software manufacturer executives to require their organizations to conduct formal testing (see OWASP testing guidance) to determine their products’ susceptibility to directory traversal vulnerabilities.”

The two agencies also urge all software users to inquire with their partners, if they had conducted formal directory traversal testing. 

“Should manufacturers discover their systems lack the appropriate mitigations, they should ensure their software developers immediately implement mitigations to eliminate this entire class of defect from all products. Building security into products from the beginning can eliminate directory traversal vulnerabilities,” the two concluded.

More from TechRadar Pro

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.