Dark Mode
Capec-38 Detail
Leveraging/Manipulating Configuration File Search Paths
Detailed Software Likelihood: High Typical Severity: Very High
Parents: 159
Threats: T79 T287 T337 T391 T406
This pattern of attack sees an adversary load a malicious resource into a program's standard path so that when a known command is executed then the system instead executes the malicious component. The adversary can either modify the search path a program uses, like a PATH variable or classpath, or they can manipulate resources on the path to point to their malicious components. J2EE applications and other component based applications that are built from multiple binaries can have very long list of dependencies to execute. If one of these libraries and/or references is controllable by the attacker then application controls can be circumvented by the attacker.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-38 | capec | https://capec.mitre.org/data/definitions/38.html | |
| CWE-426 | cwe | http://cwe.mitre.org/data/definitions/426.html | |
| CWE-427 | cwe | http://cwe.mitre.org/data/definitions/427.html | |
| T1574.007 | ATTACK | https://attack.mitre.org/wiki/Technique/T1574/007 | Hijack Execution Flow: Path Interception by PATH Environment Variable |
| T1574.009 | ATTACK | https://attack.mitre.org/wiki/Technique/T1574/009 | Hijack Execution Flow: Path Interception by Unquoted Path |
| REF-1 | reference_from_CAPEC | G. Hoglund, G. McGraw, Exploiting Software: How to Break Code, 2004--02, Addison-Wesley |
Not present
- The attacker must be able to write to redirect search paths on the victim host.
Not present
| Low |
|---|
| To identify and execute against an over-privileged system interface |
| Integrity | Availability | Authorization | Access Control | Confidentiality |
|---|---|---|---|---|
| Execute Unauthorized Commands (Run Arbitrary Code) | Execute Unauthorized Commands (Run Arbitrary Code) | Gain Privileges | Gain Privileges | Execute Unauthorized Commands (Run Arbitrary Code) |
| Gain Privileges |
- Another method is to redirect commands by aliasing one legitimate command to another to create unexpected results. the Unix command "rm" could be aliased to "mv" and move all files the victim thinks they are deleting to a directory the attacker controls. In a Unix shell .profile setting alias rm=mv /usr/home/attacker In this case the attacker retains a copy of all the files the victim attempts to remove.
- A standard UNIX path looks similar to this /bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin If the attacker modifies the path variable to point to a locale that includes malicious resources then the user unwittingly can execute commands on the attackers' behalf: /evildir/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin This is a form of usurping control of the program and the attack can be done on the classpath, database resources, or any other resources built from compound parts. At runtime detection and blocking of this attack is nearly impossible, because the configuration allows execution.