Dark Mode

Settings

Capec-160 Detail

Exploit Script-Based APIs

Standard Software Typical Severity: Medium

Parents: 113

Threats: T62

Description

Some APIs support scripting instructions as arguments. Methods that take scripted instructions (or references to scripted instructions) can be very flexible and powerful. However, if an attacker can specify the script that serves as input to these methods they can gain access to a great deal of functionality. For example, HTML pages support

Not present

External ID Source Link Description
CAPEC-160 capec https://capec.mitre.org/data/definitions/160.html
CWE-346 cwe http://cwe.mitre.org/data/definitions/346.html
Explore
  1. Identify API: Discover an API of interest by exploring application documentation or observing responses to API calls

  2. Techniques
    Search via internet for known, published APIs that support scripting instructions as arguments
Experiment
  1. Test simple script: Adversaries will attempt to give a smaller script as input to the API, such as simply printing to the console, to see if the attack is viable.

  2. Techniques
    Create a general script to be taken as input by the API
Exploit
  1. Give malicious scripting instructions to API: Adversaries will now craft custom scripts to do malicious behavior. Depending on the setup of the application this script could be run with user or admin level priveleges.

  2. Techniques
    Crafting a malicious script to be run on a system based on priveleges and capabilities of the system
  1. The target application must include the use of APIs that execute scripts.
  2. The target application must allow the attacker to provide some or all of the arguments to one of these script interpretation methods and must fail to adequately filter these arguments for dangerous or unwanted script commands.
  1. None: No specialized resources are required to execute this type of attack.

Not present

Not present

Not present