[Identify attacker-writable terminals] Determine if users TTYs are writable by the attacker.
[Execute malicious commands] Using one or more vulnerable TTY, execute commands to achieve various impacts.
Nom de la faiblesse | |
---|---|
CWE-77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Nom | Organisation | Date | Date de publication |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Attack_Phases, Description, Description Summary, Related_Vulnerabilities | |
CAPEC Content Team | The MITRE Corporation | Updated Attacker_Skills_or_Knowledge_Required, Related_Attack_Patterns, Type (Attack_Pattern -> Relationship) | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Example_Instances | |
CAPEC Content Team | The MITRE Corporation | Updated Example_Instances |