LAB 339 – Defending Go Applications Against Path Traversal

Course Overview


Path Traversal vulnerabilities in Go applications occur when user input is concatenated with a string to form a path to access filesystem objects without proper validation and authorization checks. This lab offers hands-on experience testing for Path Traversal vulnerabilities and implementing suitable mitigations. Potential mitigations include resolving path traversal characters, removing extraneous duplicate characters, resolving embedded environment variables, and anchoring to a fixed location. The virtual environment provides a vulnerable application and its complete source code for developers to identify and remediate Path Traversal vulnerabilities effectively, preventing unauthorized access to filesystem objects and ensuring application integrity and security. After completing this lab, the learner will understand how to defend Go applications against Path Traversal vulnerabilities by receiving hands-on experience testing for these vulnerabilities and implementing appropriate mitigation.

Looking To Learn More?

Request more information on our courses and labs.

* required

Course Details

Course Number: LAB 339
Course Duration: 15 minutes
Course CPE Credits: 0.3

NICE Work Role Category

  • Not assigned
StandardTechnologyTypePlatform

Available Languages

  • English