| Home > CAPEC List > CAPEC-73: User-Controlled Filename (Version 3.9) |
|
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 165 | File Manipulation |
| CanPrecede | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 592 | Stored XSS |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Manipulate System Resources |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality Access Control Authorization | Gain Privileges | |
Confidentiality Integrity Availability | Execute Unauthorized Commands | |
Availability | Alter Execution Logic | |
Confidentiality | Read Data |
| CWE-ID | Weakness Name |
|---|---|
| 20 | Improper Input Validation |
| 184 | Incomplete List of Disallowed Inputs |
| 96 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
| 348 | Use of Less Trusted Source |
| 116 | Improper Encoding or Escaping of Output |
| 350 | Reliance on Reverse DNS Resolution for a Security-Critical Action |
| 86 | Improper Neutralization of Invalid Characters in Identifiers in Web Pages |
| 697 | Incorrect Comparison |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2017年05月01日 (Version 2.10) | CAPEC Content Team | The MITRE Corporation |
| Updated Description Summary, Related_Attack_Patterns | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||