CAPEC-40

Manipulating Writeable Terminal Devices
Wysoki
Draft
2014-06-23
00h00 +00:00
2022-09-29
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

This attack exploits terminal devices that allow themselves to be written to by other users. The attacker sends command strings to the target terminal device hoping that the target user will hit enter and thereby execute the malicious command with their privileges. The attacker can send the results (such as copying /etc/passwd) to a known directory and collect once the attack has succeeded.

Informacje CAPEC

Przebieg wykonania

1) Explore

[Identify attacker-writable terminals] Determine if users TTYs are writable by the attacker.

Technika
  • Determine the permissions for the TTYs found on the system. Any that allow user write to the TTY may be vulnerable.
  • Attempt to write to other user TTYs. This approach could leave a trail or alert a user.
2) Exploit

[Execute malicious commands] Using one or more vulnerable TTY, execute commands to achieve various impacts.

Technika
  • Commands that allow reading or writing end user files can be executed.

Wymagania wstępne

User terminals must have a permissive access control such as world writeable that allows normal users to control data on other user's terminals.

Wymagane umiejętności

Ability to discover permissions on terminal devices. Of course, brute force can also be used.

Wymagane zasoby

Access to a terminal on the target network

Łagodzenie

Design: Ensure that terminals are only writeable by named owner user and/or administrator
Design: Enforce principle of least privilege

Powiązane słabości

CWE-ID Nazwa słabości

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Odniesienia

REF-1

Exploiting Software: How to Break Code
G. Hoglund, G. McGraw.

Zgłoszenie

Nazwa Organizacja Data Data wydania
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2017-08-04 +00:00 Updated Attack_Phases, Description, Description Summary, Related_Vulnerabilities
CAPEC Content Team The MITRE Corporation 2018-07-31 +00:00 Updated Attacker_Skills_or_Knowledge_Required, Related_Attack_Patterns, Type (Attack_Pattern -> Relationship)
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Example_Instances
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Example_Instances