CAPEC 88 OS Command Injection

Draft Standard High Risk
Severity High

Description

In this type of an attack, an adversary injects operating system commands into existing application functions. An application that uses untrusted input to build command strings is vulnerable. An adversary can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.

Attack Execution Flow

4

Mitigations

3

Consequences

Relationships