Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-76:Manipulating Web Input to File System Calls
Attack Pattern ID:76
Version:v3.9
Attack Pattern Name:Manipulating Web Input to File System Calls
Abstraction:Detailed
Status:Draft
Likelihood of Attack:High
Typical Severity:Very High
DetailsContent HistoryRelated WeaknessesReports
11Weaknesses found

CWE-15
External Control of System or Configuration Setting
ShareView Details
External Control of System or Configuration Setting
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in48CVEs

One or more system settings or configuration elements can be externally controlled by a user.

Impacts-
Varies by Context
Tags-
Separation of PrivilegeICS/OT (technology class)Varies by Context (impact)
As Seen In-
Not Available
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
ShareView Details
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Likelihood of Exploit-High
Mapping-Allowed
Abstraction-Base
Found in8250CVEs

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Impacts-
Execute Unauthorized Code or CommandsModify Files or DirectoriesRead Files or DirectoriesDoS: Crash, Exit, or Restart
Tags-
High exploitEnvironment HardeningSandbox or JailLibraries or FrameworksInput ValidationFirewallAttack Surface ReductionEnforcement by ConversionExecute Unauthorized Code or Commands (impact)Read Files or Directories (impact)Modify Files or Directories (impact)DoS: Crash, Exit, or Restart (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2021 CWE Top 25 Most Dangerous SoftwareCISQ Data Protection Measures2020 CWE Top 25 Most Dangerous Software2022 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous SoftwareOriginally Used by NVD from 2008 to 2016CWE Cross-section
CWE-23
Relative Path Traversal
ShareView Details
Relative Path Traversal
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in369CVEs

The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.

Impacts-
Execute Unauthorized Code or CommandsModify Files or DirectoriesRead Files or DirectoriesDoS: Crash, Exit, or Restart
Tags-
Input ValidationExecute Unauthorized Code or Commands (impact)Read Files or Directories (impact)Modify Files or Directories (impact)DoS: Crash, Exit, or Restart (impact)
As Seen In-
CWE Cross-section
CWE-272
Least Privilege Violation
ShareView Details
Least Privilege Violation
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in24CVEs

The elevated privilege level required to perform operations such as chroot() should be dropped immediately after the operation is performed.

Impacts-
Read Files or DirectoriesGain Privileges or Assume IdentityRead Application Data
Tags-
Separation of PrivilegeRead Files or Directories (impact)Read Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-285
Improper Authorization
ShareView Details
Improper Authorization
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in1057CVEs

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Impacts-
Gain Privileges or Assume IdentityRead Files or DirectoriesRead Application DataModify Application DataModify Files or Directories
Tags-
Web ServerDatabase ServerHigh exploitLibraries or FrameworksModify Application Data (impact)Read Files or Directories (impact)Modify Files or Directories (impact)Read Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-346
Origin Validation Error
ShareView Details
Origin Validation Error
Likelihood of Exploit-Not Available
Mapping-Allowed-with-Review
Abstraction-Class
Found in435CVEs

The product does not properly verify that the source of data or communication is valid.

Impacts-
Gain Privileges or Assume IdentityVaries by Context
Tags-
Varies by Context (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-348
Use of Less Trusted Source
ShareView Details
Use of Less Trusted Source
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in33CVEs

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Impacts-
Bypass Protection MechanismGain Privileges or Assume Identity
Tags-
Bypass Protection Mechanism (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section
CWE-59
Improper Link Resolution Before File Access ('Link Following')
ShareView Details
Improper Link Resolution Before File Access ('Link Following')
Likelihood of Exploit-Medium
Mapping-Allowed
Abstraction-Base
Found in1412CVEs

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Impacts-
Bypass Protection MechanismExecute Unauthorized Code or CommandsModify Files or DirectoriesRead Files or Directories
Tags-
Medium exploitSeparation of PrivilegeWindows(os class)Unix(os class)Execute Unauthorized Code or Commands (impact)Bypass Protection Mechanism (impact)Read Files or Directories (impact)Modify Files or Directories (impact)
As Seen In-
Originally Used by NVD from 2008 to 2016CWE Cross-section
CWE-73
External Control of File Name or Path
ShareView Details
External Control of File Name or Path
Likelihood of Exploit-High
Mapping-Allowed
Abstraction-Base
Found in343CVEs

The product allows user input to control or influence paths or file names that are used in filesystem operations.

Impacts-
Execute Unauthorized Code or CommandsDoS: Resource Consumption (Other)Read Files or DirectoriesDoS: Crash, Exit, or RestartModify Files or Directories
Tags-
High exploitInput ValidationmacOS(os class)Windows(os class)Unix(os class)Execute Unauthorized Code or Commands (impact)Read Files or Directories (impact)Modify Files or Directories (impact)DoS: Crash, Exit, or Restart (impact)DoS: Resource Consumption (Other) (impact)
As Seen In-
Not Available
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
ShareView Details
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in4075CVEs

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Impacts-
Read Application DataBypass Protection MechanismAlter Execution LogicHide ActivitiesOther
Tags-
High exploitOther (impact)Bypass Protection Mechanism (impact)Hide Activities (impact)Read Application Data (impact)Alter Execution Logic (impact)
As Seen In-
Simplified Mapping of Published Vulnerabilities
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
ShareView Details
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Likelihood of Exploit-High
Mapping-Allowed-with-Review
Abstraction-Class
Found in3055CVEs

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Impacts-
Execute Unauthorized Code or Commands
Tags-
AI/MLHigh exploitInput ValidationExecute Unauthorized Code or Commands (impact)
As Seen In-
2021 CWE Top 25 Most Dangerous SoftwareCISQ Data Protection Measures2022 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous Software