Dark Mode

Settings

Capec-38 Detail

Leveraging/Manipulating Configuration File Search Paths

Detailed Software Likelihood: High Typical Severity: Very High

Parents: 159

Threats: T79 T287 T337 T391 T406

Description

This pattern of attack sees an adversary load a malicious resource into a program's standard path so that when a known command is executed then the system instead executes the malicious component. The adversary can either modify the search path a program uses, like a PATH variable or classpath, or they can manipulate resources on the path to point to their malicious components. J2EE applications and other component based applications that are built from multiple binaries can have very long list of dependencies to execute. If one of these libraries and/or references is controllable by the attacker then application controls can be circumvented by the attacker.

Not present

External ID Source Link Description
CAPEC-38 capec https://capec.mitre.org/data/definitions/38.html
CWE-426 cwe http://cwe.mitre.org/data/definitions/426.html
CWE-427 cwe http://cwe.mitre.org/data/definitions/427.html
T1574.007 ATTACK https://attack.mitre.org/wiki/Technique/T1574/007 Hijack Execution Flow: Path Interception by PATH Environment Variable
T1574.009 ATTACK https://attack.mitre.org/wiki/Technique/T1574/009 Hijack Execution Flow: Path Interception by Unquoted Path
REF-1 reference_from_CAPEC G. Hoglund, G. McGraw, Exploiting Software: How to Break Code, 2004--02, Addison-Wesley

Not present

  1. The attacker must be able to write to redirect search paths on the victim host.

Not present

Low
To identify and execute against an over-privileged system interface
Integrity Availability Authorization Access Control Confidentiality
Execute Unauthorized Commands (Run Arbitrary Code) Execute Unauthorized Commands (Run Arbitrary Code) Gain Privileges Gain Privileges Execute Unauthorized Commands (Run Arbitrary Code)
Gain Privileges
  1. Another method is to redirect commands by aliasing one legitimate command to another to create unexpected results. the Unix command "rm" could be aliased to "mv" and move all files the victim thinks they are deleting to a directory the attacker controls. In a Unix shell .profile setting alias rm=mv /usr/home/attacker In this case the attacker retains a copy of all the files the victim attempts to remove.
  2. A standard UNIX path looks similar to this /bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin If the attacker modifies the path variable to point to a locale that includes malicious resources then the user unwittingly can execute commands on the attackers' behalf: /evildir/bin:/sbin:/usr/bin:/usr/local/bin:/usr/sbin This is a form of usurping control of the program and the attack can be done on the classpath, database resources, or any other resources built from compound parts. At runtime detection and blocking of this attack is nearly impossible, because the configuration allows execution.