Voraussetzungen
The attacker must be able to write to redirect search paths on the victim host.
Erforderliche Kenntnisse
To identify and execute against an over-privileged system interface
Gegenmaßnahmen
Design: Enforce principle of least privilege
Design: Ensure that the program's compound parts, including all system dependencies, classpath, path, and so on, are secured to the same or higher level assurance as the program
Implementation: Host integrity monitoring
Verwandte Schwachstellen
| CWE-ID |
Name der Schwachstelle |
|
Untrusted Search Path The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
|
Uncontrolled Search Path Element The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Referenzen
REF-1
Exploiting Software: How to Break Code
G. Hoglund, G. McGraw.
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Description, Description Summary, Examples-Instances, Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Example_Instances, Taxonomy_Mappings |