CAPEC-251: Local Code Inclusion
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
The attacker forces an application to load arbitrary code files from the local machine. The attacker could use this to try to load old versions of library files that have known vulnerabilities, to load files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.
前提条件
- The targeted application must have a bug that allows an adversary to control which code file is loaded at some juncture.
- Some variants of this attack may require that old versions of some code files be present and in predictable locations.
所需资源
- The adversary needs to have enough access to the target application to control the identity of a locally included file. The attacker may also need to be able to upload arbitrary code files to the target machine, although any location for these files may be acceptable.
后果影响
影响范围: Integrity
技术影响: Execute Unauthorized Commands
说明: Through local code inclusion, the adversary compromises the integrity of the application.
影响范围: Confidentiality
技术影响: Read Data
说明: An attacker may leverage local code inclusion in order to print sensitive data to a page, such as hidden configuration files or or password hashes.
缓解措施
Implementation: Avoid passing user input to filesystem or framework API. If necessary to do so, implement a specific, allowlist approach.
分类映射
| 分类名称 | 条目ID | 条目名称 |
|---|---|---|
| ATTACK | 1055 | Process Injection |