Dark Mode
Capec-154 Detail
Resource Location Spoofing
Meta Social Engineering Supply Chain Communications Software Hardware Likelihood: Medium Typical Severity: Medium
Children: 159 616
Threats: T79 T98 T103 T287 T337 T391 T406
An adversary deceives an application or user and convinces them to request a resource from an unintended location. By spoofing the location, the adversary can cause an alternate resource to be used, often one that the adversary controls and can be used to help them achieve their malicious goals.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-154 | capec | https://capec.mitre.org/data/definitions/154.html | |
| CWE-451 | cwe | http://cwe.mitre.org/data/definitions/451.html |
Not present
- None. All applications rely on file paths and therefore, in theory, they or their resources could be affected by this type of attack.
- None: No specialized resources are required to execute this type of attack.
Not present
| Authorization |
|---|
| Execute Unauthorized Commands (Run Arbitrary Code) |
Not present