CAPEC-40

Manipulating Writeable Terminal Devices
Haute
Draft
2014-06-23
00h00 +00:00
2022-09-29
00h00 +00:00
Alerte pour un CAPEC
Restez informé de toutes modifications pour un CAPEC spécifique.
Gestion des notifications

Descriptions du CAPEC

This attack exploits terminal devices that allow themselves to be written to by other users. The attacker sends command strings to the target terminal device hoping that the target user will hit enter and thereby execute the malicious command with their privileges. The attacker can send the results (such as copying /etc/passwd) to a known directory and collect once the attack has succeeded.

Informations du CAPEC

Flux d'exécution

1) Explore

[Identify attacker-writable terminals] Determine if users TTYs are writable by the attacker.

Technique
  • Determine the permissions for the TTYs found on the system. Any that allow user write to the TTY may be vulnerable.
  • Attempt to write to other user TTYs. This approach could leave a trail or alert a user.
2) Exploit

[Execute malicious commands] Using one or more vulnerable TTY, execute commands to achieve various impacts.

Technique
  • Commands that allow reading or writing end user files can be executed.

Conditions préalables

User terminals must have a permissive access control such as world writeable that allows normal users to control data on other user's terminals.

Compétences requises

Ability to discover permissions on terminal devices. Of course, brute force can also be used.

Ressources nécessaires

Access to a terminal on the target network

Atténuations

Design: Ensure that terminals are only writeable by named owner user and/or administrator
Design: Enforce principle of least privilege

Faiblesses connexes

CWE-ID Nom de la faiblesse

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Références

REF-1

Exploiting Software: How to Break Code
G. Hoglund, G. McGraw.

Soumission

Nom Organisation Date Date de publication
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modifications

Nom Organisation Date Commentaire
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Attack_Phases, Description, Description Summary, Related_Vulnerabilities
CAPEC Content Team The MITRE Corporation 2018-07-31 +00:00 Updated Attacker_Skills_or_Knowledge_Required, Related_Attack_Patterns, Type (Attack_Pattern -> Relationship)
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Example_Instances
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Example_Instances