| Home > CAPEC List > CAPEC-35: Leverage Executable Code in Non-Executable Files (Version 3.9) |
|
High
Very High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 636 | Hiding Malicious Data or Code within Files |
| PeerOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 23 | File Content Injection |
| PeerOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 75 | Manipulating Writeable Configuration Files |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Manipulate System Resources |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality Integrity Availability | Execute Unauthorized Commands | |
Integrity | Modify Data | |
Confidentiality Access Control Authorization | Gain Privileges |
Another example targets clients reading pdf files. In this case the attacker simply appends javascript to the end of a legitimate url for a pdf (http://www.gnucitizen.org/blog/danger-danger-danger/)
http://path/to/pdf/file.pdf#whatever_name_you_want=javascript:your_code_here
The client assumes that they are reading a pdf, but the attacker has modified the resource and loaded executable javascript into the client's browser process.
The attack can also target server processes. The attacker edits the resource or configuration file, for example a web.xml file used to configure security permissions for a J2EE app server, adding role name "public" grants all users with the public role the ability to use the administration functionality.
The server trusts its configuration file to be correct, but when they are manipulated, the attacker gains full control.
| CWE-ID | Weakness Name |
|---|---|
| 94 | Improper Control of Generation of Code ('Code Injection') |
| 96 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
| 95 | Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
| 97 | Improper Neutralization of Server-Side Includes (SSI) Within a Web Page |
| 272 | Least Privilege Violation |
| 59 | Improper Link Resolution Before File Access ('Link Following') |
| 282 | Improper Ownership Management |
| 270 | Privilege Context Switching Error |
| Entry ID | Entry Name |
|---|---|
| 1027.006 | Obfuscated Files or Information: HTML Smuggling |
| 1027.009 | Obfuscated Files or Information: Embedded Payloads |
| 1564.009 | Hide Artifacts: Resource Forking |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2015年12月07日 (Version 2.8) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation |
| Updated Description, Description Summary, Examples-Instances, Related_Attack_Patterns, Type (Attack_Pattern -> Relationship) | ||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Weaknesses | ||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation |
| Updated Example_Instances, Taxonomy_Mappings | ||
| 2023年01月24日 (Version 3.9) | CAPEC Content Team | The MITRE Corporation |
| Updated Taxonomy_Mappings | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||