Skip to content

Conversation

@timokoessler
Copy link
Member

No description provided.

@codecov
Copy link

codecov bot commented May 12, 2025

Codecov Report

Attention: Patch coverage is 99.24812% with 1 line in your changes missing coverage. Please review.

Files with missing lines Patch % Lines
library/helpers/getRawUrlPath.ts 95.00% 1 Missing ⚠️

📢 Thoughts on this report? Let us know!

}

// Also check encoded paths
const decodedPath = decodeURIComponent(rawPath);
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does not cover double-encoding, should we?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question for @kapyteinaikido

@timokoessler timokoessler marked this pull request as ready for review May 12, 2025 11:26
@timokoessler timokoessler changed the title Improve reliability of path traversal detection Block request if URL path contains path traversal patterns May 12, 2025
return true;
}

// Only checks the url path for path traversal attacks, other inputs are checked using the sinks

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Function handles multiple unrelated security concerns (IP blocking, user agent blocking, path traversal) in 185 lines.

Feedback

Post a comment with the following structure to provide feedback on this finding:

@AikidoSec feedback: [FEEDBACK]

Aikido will process this feedback into learnings to give better review comments in the future.
More info

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants