I'm studying Android security vulnerabilities, and since Java is being used, the attacks in the language also need to be addressed.
I'm studying from this link.
I have a fair idea about canonical paths, absolute paths, and relative paths in Linux. But this statement :
However, the user can still specify a file outside the intended directory by entering an argument that contains ../ sequences
I know ..
refers to parent of the present directory in which the file is present, but cannot understand how an attacker might end up using ..
to craft malicious file paths that aren't part of the /img/
directory (mentioned in the article), and still be able to succeed. I'm searching for any examples that might take advantage of this vulnerability and get past the security check. Any help would be much appreciated.