CAPEC-75: Manipulating Writeable Configuration Files

ID CAPEC-75
Typical Severity Very High
Likelihood Of Attack High
Status Draft

Generally these are manually edited files that are not in the preview of the system administrators, any ability on the attackers' behalf to modify these files, for example in a CVS repository, gives unauthorized access directly to the application, the same as authorized users.

https://capec.mitre.org/data/definitions/75.html

Weaknesses

# ID Name Type
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') weakness
CWE-99 Improper Control of Resource Identifiers ('Resource Injection') weakness
CWE-346 Origin Validation Error weakness
CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data weakness
CWE-353 Missing Support for Integrity Check weakness
CWE-354 Improper Validation of Integrity Check Value weakness
Loading...