Prerequisiti
The target application must include external code/libraries that are executed when the application runs and the adversary must be able to influence the specific files that get included.
The victim must run the targeted application, possibly using the crafted parameters that the adversary uses to identify the code to include.
Risorse richieste
The adversary may need the capability to host code modules if they wish their own code files to be included.
Vulnerabilità correlate
| CWE-ID |
Nome della vulnerabilità |
|
Inclusion of Functionality from Untrusted Control Sphere The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. |
Invio
| Nome |
Organizzazione |
Data |
Data di rilascio |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifiche
| Nome |
Organizzazione |
Data |
Commento |
| CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Activation_Zone, Attack_Prerequisites, Description Summary, Examples-Instances, Injection_Vector, Payload, Payload_Activation_Impact, Related_Weaknesses, Resources_Required, Typical_Likelihood_of_Exploit |