CAPEC-35: Leverage Executable Code in Non-Executable Files

ID CAPEC-35
Typical Severity Very High
Likelihood Of Attack High
Status Draft

An attack of this type exploits a system's trust in configuration and resource files. When the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high.

https://capec.mitre.org/data/definitions/35.html

Weaknesses

# ID Name Type
CWE-59 Improper Link Resolution Before File Access ('Link Following') weakness
CWE-94 Improper Control of Generation of Code ('Code Injection') weakness
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') weakness
CWE-96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') weakness
CWE-97 Improper Neutralization of Server-Side Includes (SSI) Within a Web Page weakness
CWE-270 Privilege Context Switching Error weakness
CWE-272 Least Privilege Violation weakness
CWE-282 Improper Ownership Management weakness
Loading...