CAPEC-17: Using Malicious Files

Standard Draft 严重程度: Very High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.

执行流程

步骤 1 Explore

[Determine File/Directory Configuration] The adversary looks for misconfigured files or directories on a system that might give executable access to an overly broad group of users.

技术:
  • Through shell access to a system, use the command "ls -l" to view permissions for files and directories.
步骤 2 Experiment

[Upload Malicious Files] If the adversary discovers a directory that has executable permissions, they will attempt to upload a malicious file to execute.

技术:
  • Upload a malicious file through a misconfigured FTP server.
步骤 3 Exploit

[Execute Malicious File] The adversary either executes the uploaded malicious file, or executes an existing file that has been misconfigured to allow executable access to the adversary.

前提条件

  • System's configuration must allow an attacker to directly access executable files or upload files to execute. This means that any access control system that is supposed to mediate communications between the subject and the object is set incorrectly or assumes a benign environment.

所需技能

Low To identify and execute against an over-privileged system interface

所需资源

  • Ability to communicate synchronously or asynchronously with server that publishes an over-privileged directory, program, or interface. Optionally, ability to capture output directly through synchronous communication or other method such as FTP.

后果影响

影响范围: Confidentiality Integrity Availability

技术影响: Execute Unauthorized Commands

说明: Run Arbitrary Code

影响范围: Integrity

技术影响: Modify Data

影响范围: Confidentiality

技术影响: Read Data

影响范围: Confidentiality Access Control Authorization

技术影响: Gain Privileges

缓解措施

Design: Enforce principle of least privilege

Design: Run server interfaces with a non-root account and/or utilize chroot jails or other configuration techniques to constrain privileges even if attacker gains some limited access to commands.

Implementation: Perform testing such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables.

分类映射

分类名称 条目ID 条目名称
ATTACK 1574.005 Hijack Execution Flow: Executable Installer File Permissions Weakness
ATTACK 1574.010 Hijack Execution Flow: Services File Permissions Weakness
关键信息

CAPEC ID: CAPEC-17

抽象级别: Standard

状态: Draft

典型严重程度: Very High

攻击可能性: High

相关攻击模式