CAPEC 17 Using Malicious Files

Draft Standard High Risk
Severity Very High

Description

An attack of this type exploits a system's configuration that allows an adversary to either directly access an executable file, for example through shell access; or in a possible worst case allows an adversary to upload a file and then execute it. Web servers, ftp servers, and message oriented middleware systems which have many integration points are particularly vulnerable, because both the programmers and the administrators must be in synch regarding the interfaces and the correct privileges for each interface.

Attack Execution Flow

3

Mitigations

3

Consequences

Relationships

Related ATT&CK Techniques

2

Resources Required

1