CAPEC-96: Block Access to Libraries

Detailed Draft 严重程度: Medium 攻击可能性: Medium

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An application typically makes calls to functions that are a part of libraries external to the application. These libraries may be part of the operating system or they may be third party libraries. It is possible that the application does not handle situations properly where access to these libraries has been blocked. Depending on the error handling within the application, blocked access to libraries may leave the system in an insecure state that could be leveraged by an attacker.

执行流程

步骤 1 Explore

Determine what external libraries the application accesses.

步骤 2 Experiment

Block access to the external libraries accessed by the application.

步骤 3 Experiment

Monitor the behavior of the system to see if it goes into an insecure/inconsistent state.

步骤 4 Experiment

If the system does go into an insecure/inconsistent state, leverage that to obtain information about the system functionality or data, elevate access control, etc. The rest of this attack will depend on the context and the desired goal.

前提条件

  • An application requires access to external libraries.
  • An attacker has the privileges to block application access to external libraries.

所需技能

Low Knowledge of how to block access to libraries, as well as knowledge of how to leverage the resulting state of the application based on the failed call.

后果影响

影响范围: Availability

技术影响: Alter Execution Logic

影响范围: Confidentiality

技术影响: Other

影响范围: Confidentiality Access Control Authorization

技术影响: Bypass Protection Mechanism

缓解措施

Ensure that application handles situations where access to APIs in external libraries is not available securely. If the application cannot continue its execution safely it should fail in a consistent and secure fashion.

示例实例

A web-based system uses a third party cryptographic random number generation library that derives entropy from machine's hardware. This library is used in generation of user session ids used by the application. If the library is inaccessible, the application instead uses a software based weak pseudo random number generation library. An attacker of the system blocks access of the application to the third party cryptographic random number generation library (by renaming it). The application in turn uses the weak pseudo random number generation library to generate session ids that are predictable. An attacker then leverages this weakness to guess a session id of another user to perform a horizontal elevation of privilege escalation and gain access to another user's account.

关键信息

CAPEC ID: CAPEC-96

抽象级别: Detailed

状态: Draft

典型严重程度: Medium

攻击可能性: Medium

相关攻击模式
相关CWE弱点