Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-73:User-Controlled Filename
Attack Pattern ID:73
Version:v3.9
Attack Pattern Name:User-Controlled Filename
Abstraction:Standard
Status:Draft
Likelihood of Attack:High
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Description
An attack of this type involves an adversary inserting malicious characters (such as a XSS redirection) into a filename, directly or indirectly that is then used by the target software to generate HTML text or other potentially executable content. Many websites rely on user-generated content and dynamically build resources like files, filenames, and URL links directly from user supplied data. In this attack pattern, the attacker uploads code that can execute in the client browser and/or redirect the client browser to a site that the attacker owns. All XSS attack payload variants can be used to pass and exploit these vulnerabilities.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfM165File Manipulation
CanPrecedeD592Stored XSS
Nature: ChildOf
Type: Meta
ID: 165
Name: File Manipulation
Nature: CanPrecede
Type: Detailed
ID: 592
Name: Stored XSS
▼Execution Flow
▼Prerequisites
The victim must trust the name and locale of user controlled filenames.
▼Skills Required
Low

To achieve a redirection and use of less trusted source, an attacker can simply edit data that the host uses to build the filename


Medium

Deploying a malicious "look-a-like" site (such as a site masquerading as a bank or online auction site) that the user enters their authentication data into.


High

Exploiting a client side vulnerability to inject malicious scripts into the browser's executable process.

▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
ConfidentialityAccess ControlAuthorizationN/AGain PrivilegesN/A
ConfidentialityIntegrityAvailabilityN/AExecute Unauthorized CommandsRun Arbitrary Code
AvailabilityN/AAlter Execution LogicN/A
ConfidentialityN/ARead DataN/A
Scope: Confidentiality, Access Control, Authorization
Likelihood: N/A
Impact: Gain Privileges
Note: N/A
Scope: Confidentiality, Integrity, Availability
Likelihood: N/A
Impact: Execute Unauthorized Commands
Note: Run Arbitrary Code
Scope: Availability
Likelihood: N/A
Impact: Alter Execution Logic
Note: N/A
Scope: Confidentiality
Likelihood: N/A
Impact: Read Data
Note: N/A
▼Mitigations
Design: Use browser technologies that do not allow client side scripting.
Implementation: Ensure all content that is delivered to client is sanitized against an acceptable content specification.
Implementation: Perform input validation for all remote content.
Implementation: Perform output validation for all remote content.
Implementation: Disable scripting languages such as JavaScript in browser
Implementation: Scan dynamically generated content against validation specification
▼Example Instances
▼Related Weaknesses
IDName
CWE-116Improper Encoding or Escaping of Output
CWE-184Incomplete List of Disallowed Inputs
CWE-20Improper Input Validation
CWE-348Use of Less Trusted Source
CWE-350Reliance on Reverse DNS Resolution for a Security-Critical Action
CWE-697Incorrect Comparison
CWE-86Improper Neutralization of Invalid Characters in Identifiers in Web Pages
CWE-96Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
ID: CWE-116
Name: Improper Encoding or Escaping of Output
ID: CWE-184
Name: Incomplete List of Disallowed Inputs
ID: CWE-20
Name: Improper Input Validation
ID: CWE-348
Name: Use of Less Trusted Source
ID: CWE-350
Name: Reliance on Reverse DNS Resolution for a Security-Critical Action
ID: CWE-697
Name: Incorrect Comparison
ID: CWE-86
Name: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
ID: CWE-96
Name: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Reference ID: REF-1
Title: Exploiting Software: How to Break Code
Author: G. Hoglund, G. McGraw
Publication:
Publisher:Addison-Wesley
Edition:
URL:
URL Date:
Day:N/A
Month:02
Year:2004
Details not found