CAPEC-17: Using Malicious Files

ID CAPEC-17
Typical Severity Very High
Likelihood Of Attack High
Status Draft

An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.

https://capec.mitre.org/data/definitions/17.html

Weaknesses

# ID Name Type
CWE-59 Improper Link Resolution Before File Access ('Link Following') weakness
CWE-270 Privilege Context Switching Error weakness
CWE-272 Least Privilege Violation weakness
CWE-282 Improper Ownership Management weakness
CWE-285 Improper Authorization weakness
CWE-693 Protection Mechanism Failure weakness
CWE-732 Incorrect Permission Assignment for Critical Resource weakness
Loading...