CAPEC-695: Repo Jacking

Detailed Stable 严重程度: High 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

执行流程

步骤 1 Explore

[Identify target] The adversary must first identify a target repository that is commonly used and whose owner/maintainer has either changed/deleted their username or transferred ownership of the repository and then deleted their account. The target should typically be a popular and widely used package, as to increase the scope of the attack.

步骤 2 Experiment

[Recreate initial repository path] The adversary re-registers the account that was renamed/deleted by the target repository's owner/maintainer and recreates the target repository with malicious code intended to exploit an application. These steps may need to happen in reverse (i.e., recreate repository and then rename an existing account to the target account) if protections are in place to prevent repository reuse.

步骤 3 Exploit

[Exploit victims] The adversary's malicious code is incorporated into applications that directly reference the initial repository, which further allows the adversary to conduct additional attacks.

前提条件

  • Identification of a popular repository that may be directly referenced in numerous software applications
  • A repository owner/maintainer who has recently changed their username or deleted their account

所需技能

Low Ability to create an account on a VCS hosting site and recreate an existing directory structure.
Low Ability to create malware that can exploit various software applications.

后果影响

影响范围: Integrity

技术影响: Read Data

影响范围: Access Control Authorization

技术影响: Execute Unauthorized Commands

缓解措施

Leverage dedicated package managers instead of directly linking to VCS repositories.

Utilize version pinning and lock files to prevent use of maliciously modified repositories.

Implement "vendoring" (i.e., including third-party dependencies locally) and leverage automated testing techniques (e.g., static analysis) to determine if the software behaves maliciously.

Leverage automated tools, such as Checkmarx's "ChainJacking" tool, to determine susceptibility to Repo Jacking attacks.

分类映射

分类名称 条目ID 条目名称
ATTACK 1195.001 Supply Chain Compromise: Compromise Software Dependencies and Development Tools
关键信息

CAPEC ID: CAPEC-695

抽象级别: Detailed

状态: Stable

典型严重程度: High

攻击可能性: Medium

相关攻击模式
相关CWE弱点