|
|
|
CAPEC-242: Code Injection |
Description An adversary exploits a weakness in input validation on the target to inject new code into that which is currently executing. This differs from code inclusion in that code inclusion involves the addition or replacement of a reference to a code file, which is subsequently loaded by the target and used as part of the code of some application. Likelihood Of Attack Typical Severity Prerequisites
The target software does not validate user-controlled input such that the execution of a process may be altered by sending code in through legitimate data channels, using no other mechanism. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.Scope | Impact | Likelihood |
---|
Confidentiality Integrity Availability | Other | |
Mitigations
Utilize strict type, character, and encoding enforcement |
Ensure all input content that is delivered to client is sanitized against an acceptable content specification. |
Perform input validation for all content. |
Enforce regular patching of software. |
Taxonomy Mappings Relevant to the OWASP taxonomy mapping References Content History Submissions |
---|
Submission Date | Submitter | Organization |
---|
2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | Modifications |
---|
Modification Date | Modifier | Organization |
---|
2017-05-01 (Version 2.10) | CAPEC Content Team | The MITRE Corporation | Updated Attack_Motivation-Consequences, Attack_Prerequisites, Related_Weaknesses, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit, Typical_Severity | 2019-04-04 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | Updated References, Taxonomy_Mappings |
More information is available — Please select a different filter.
|