CAPEC-160: Exploit Script-Based APIs

Standard Draft 严重程度: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

Some APIs support scripting instructions as arguments. Methods that take scripted instructions (or references to scripted instructions) can be very flexible and powerful. However, if an attacker can specify the script that serves as input to these methods they can gain access to a great deal of functionality. For example, HTML pages support <script> tags that allow scripting languages to be embedded in the page and then interpreted by the receiving web browser. If the content provider is malicious, these scripts can compromise the client application. Some applications may even execute the scripts under their own identity (rather than the identity of the user providing the script) which can allow attackers to perform activities that would otherwise be denied to them.

执行流程

步骤 1 Explore

[Identify API] Discover an API of interest by exploring application documentation or observing responses to API calls

技术:
  • Search via internet for known, published APIs that support scripting instructions as arguments
步骤 2 Experiment

[Test simple script] Adversaries will attempt to give a smaller script as input to the API, such as simply printing to the console, to see if the attack is viable.

技术:
  • Create a general script to be taken as input by the API
步骤 3 Exploit

[Give malicious scripting instructions to API] Adversaries will now craft custom scripts to do malicious behavior. Depending on the setup of the application this script could be run with user or admin level priveleges.

技术:
  • Crafting a malicious script to be run on a system based on priveleges and capabilities of the system

前提条件

  • The target application must include the use of APIs that execute scripts.
  • The target application must allow the attacker to provide some or all of the arguments to one of these script interpretation methods and must fail to adequately filter these arguments for dangerous or unwanted script commands.

所需资源

  • None: No specialized resources are required to execute this type of attack.
关键信息

CAPEC ID: CAPEC-160

抽象级别: Standard

状态: Draft

典型严重程度: Medium

相关攻击模式
相关CWE弱点