CAPEC-175: Code Inclusion

Meta Stable 严重程度: Very High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replacement of a reference to a code file, which is subsequently loaded by the target and used as part of the code of some application.

前提条件

  • The target application must include external code/libraries that are executed when the application runs and the adversary must be able to influence the specific files that get included.
  • The victim must run the targeted application, possibly using the crafted parameters that the adversary uses to identify the code to include.

所需资源

  • The adversary may need the capability to host code modules if they wish their own code files to be included.

示例实例

One example of this type of attack pattern is PHP file include attacks where the parameter of an include() function is set by a variable that an attacker is able to control. The result is that arbitrary code could be loaded into the PHP application and executed.

关键信息

CAPEC ID: CAPEC-175

抽象级别: Meta

状态: Stable

典型严重程度: Very High

攻击可能性: Medium

相关CWE弱点