Dark Mode
Capec-176 Detail
Configuration/Environment Manipulation
Meta Supply Chain Software Hardware Typical Severity: Medium
Children: 75 203 271 536 578
Threats: T62 T68 T269 T270 T271 T272 T273 T274 T297 T393
An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-176 | capec | https://capec.mitre.org/data/definitions/176.html | |
| CWE-15 | cwe | http://cwe.mitre.org/data/definitions/15.html | |
| CWE-1233 | cwe | http://cwe.mitre.org/data/definitions/1233.html | |
| CWE-1234 | cwe | http://cwe.mitre.org/data/definitions/1234.html | |
| CWE-1304 | cwe | http://cwe.mitre.org/data/definitions/1304.html | |
| CWE-1328 | cwe | http://cwe.mitre.org/data/definitions/1328.html | |
| OWASP Attacks | https://owasp.org/www-community/attacks/Setting_Manipulation | Setting Manipulation |
Not present
- The target application must consult external files or configuration controls to control its execution. All but the very simplest applications meet this requirement.
- The attacker must have the access necessary to affect the files or other environment items the targeted application uses for its operations.
Not present
Not present
Not present