<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>ESAPI on Sven Ruppert</title><link>https://sven-ruppert.info/tags/esapi/</link><description>Recent content in ESAPI on Sven Ruppert</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>sven.ruppert@gmail.com (Sven Ruppert)</managingEditor><webMaster>sven.ruppert@gmail.com (Sven Ruppert)</webMaster><copyright>© 2026 Sven Ruppert</copyright><lastBuildDate>Tue, 21 May 2024 14:33:53 +0000</lastBuildDate><atom:link href="https://sven-ruppert.info/tags/esapi/index.xml" rel="self" type="application/rss+xml"/><item><title>CWE-22: Improper Limitation of a Pathname to a Restricted Directory</title><link>https://sven-ruppert.info/posts/cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory/</link><pubDate>Tue, 21 May 2024 14:33:53 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory/</guid><description>&lt;p&gt;CWE-22, commonly called &amp;ldquo;Path Traversal,&amp;rdquo; is a vulnerability when an application fails to appropriately limit the paths users can access through a user-provided input. This can allow attackers to access directories and files outside the intended directory, leading to unauthorised access and potential system compromise. This vulnerability is particularly significant in Java applications due to the ubiquitous use of file handling and web resources. This document will delve into the nature of CWE-22, its implications, exploitation methods, and, most importantly, strategies to mitigate such vulnerabilities in Java applications.&lt;/p&gt;</description></item></channel></rss>