Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 137 | Parameter Injection |
ParentOf | D | 460 | HTTP Parameter Pollution (HPP) |
Assess Target Runtime Environment
In situations where the runtime environment is not implicitly known, the attacker makes connections to the target system and tries to determine the system's runtime environment. Knowing the environment is vital to choosing the correct delimiters.
Technique |
---|
Port mapping using network connection-based software (e.g., nmap, nessus, etc.) |
Port mapping by exploring the operating system (netstat, sockstat, etc.) |
TCP/IP Fingerprinting |
Induce errors to find informative error messages |
Survey the Application
The attacker surveys the target application, possibly as a valid and authenticated user
Technique |
---|
Spidering web sites for all available links |
Inventory all application inputs |
Attempt delimiters in inputs
The attacker systematically attempts variations of delimiters on known inputs, observing the application's response each time.
Technique |
---|
Inject command delimiters using network packet injection tools (netcat, nemesis, etc.) |
Inject command delimiters using web test frameworks (proxies, TamperData, custom programs, etc.) |
Enter command delimiters directly in input fields. |
Use malicious command delimiters
The attacker uses combinations of payload and carefully placed command delimiters to attack the software.
Technique |
---|
The attacker has to identify injection vector, identify the specific commands, and optionally collect the output, i.e. from an interactive session.
Scope | Likelihood | Impact | Note |
---|---|---|---|
ConfidentialityIntegrityAvailability | N/A | Execute Unauthorized Commands | Run Arbitrary Code |
Confidentiality | N/A | Read Data | N/A |
ID | Name |
---|---|
CWE-138 | Improper Neutralization of Special Elements |
CWE-140 | Improper Neutralization of Delimiters |
CWE-154 | Improper Neutralization of Variable Name Delimiters |
CWE-146 | Improper Neutralization of Expression/Command Delimiters |
CWE-157 | Failure to Sanitize Paired Delimiters |
CWE-184 | Incomplete List of Disallowed Inputs |
CWE-185 | Incorrect Regular Expression |
CWE-697 | Incorrect Comparison |
CWE-77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
CWE-93 | Improper Neutralization of CRLF Sequences ('CRLF Injection') |
Taxonomy Name | Entry ID | Entry Name |
---|