Dark Mode
Capec-251 Detail
Local Code Inclusion
Standard Software Typical Severity: Medium
Parents: 175
Children: 252 640 660
Threats: T290
The attacker forces an application to load arbitrary code files from the local machine. The attacker could use this to try to load old versions of library files that have known vulnerabilities, to load files that the attacker placed on the local machine during a prior attack, or to otherwise change the functionality of the targeted application in unexpected ways.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-251 | capec | https://capec.mitre.org/data/definitions/251.html | |
| CWE-829 | cwe | http://cwe.mitre.org/data/definitions/829.html | |
| T1055 | ATTACK | https://attack.mitre.org/wiki/Technique/T1055 | Process Injection |
| REF-613 | reference_from_CAPEC | https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion.html | OWASP Web Security Testing Guide, The Open Web Application Security Project (OWASP) |
Not present
- The targeted application must have a bug that allows an adversary to control which code file is loaded at some juncture.
- Some variants of this attack may require that old versions of some code files be present and in predictable locations.
- The adversary needs to have enough access to the target application to control the identity of a locally included file. The attacker may also need to be able to upload arbitrary code files to the target machine, although any location for these files may be acceptable.
Not present
| Integrity | Confidentiality |
|---|---|
| Execute Unauthorized Commands (Through local code inclusion, the adversary compromises the integrity of the application.) | Read Data (An attacker may leverage local code inclusion in order to print sensitive data to a page, such as hidden configuration files or or password hashes.) |
Not present