Path traversal vulnerability detection method
A vulnerability detection and path technology, applied in the computer field, can solve problems such as high time cost, low scene coverage, large and dirty data, etc., and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0025] Such as figure 1 As shown, a path traversal vulnerability detection method of the present invention comprises the following steps:
[0026] Step 1: Inserting the Java EE program through the bytecode enhancement method;
[0027] Step 2: The instrumentation program traces the propagation path of the data acquired by the Java EE program from the outside in the program;
[0028] Step 3: When the instrumentation program finds that the external data is directly transmitted to the path traversal risk method without passing through the security filtering method, it will make a logical judgment on the vulnerability detection; exist.
[0029] The vulnerability detection logic judgment described in Step 3 includes the following:
[0030] When the JDK version is less than 7U40, it is judged that the vulnerability is more harmful and can ac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com