CAPEC-76: Manipulating Web Input to File System Calls

ID CAPEC-76
Typical Severity Very High
Likelihood Of Attack High
Status Draft

An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.

https://capec.mitre.org/data/definitions/76.html

Weaknesses

# ID Name Type
CWE-15 External Control of System or Configuration Setting weakness
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') weakness
CWE-23 Relative Path Traversal weakness
CWE-59 Improper Link Resolution Before File Access ('Link Following') weakness
CWE-73 External Control of File Name or Path weakness
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') weakness
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') weakness
CWE-272 Least Privilege Violation weakness
CWE-285 Improper Authorization weakness
CWE-346 Origin Validation Error weakness
CWE-348 Use of Less Trusted Source weakness
Loading...