[Survey the target] Using a browser or an automated tool, an adversary records all instances of web services that process requests with serialized data.
[Craft malicious payload] The adversary crafts malicious data message that contains references to sensitive files.
[Launch an External Linking attack] Send the malicious crafted message containing the reference to a sensitive file to the target URL.
Weakness Name | |
---|---|
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Activation_Zone, Attack_Phases, Attacker_Skills_or_Knowledge_Required, Description, Description Summary, Examples-Instances, Injection_Vector, Methods_of_Attack, Payload, Payload_Activation_Impact, Resources_Required, Typical_Likelihood_of_Exploit, Typical_Severity | |
CAPEC Content Team | The MITRE Corporation | Updated Attack_Phases, Description Summary, Related_Attack_Patterns, Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated @Name, Description, Execution_Flow, Mitigations, Skills_Required | |
CAPEC Content Team | The MITRE Corporation | Updated Consequences, Description | |
CAPEC Content Team | The MITRE Corporation | Updated Description, Example_Instances, Execution_Flow, Prerequisites | |
CAPEC Content Team | The MITRE Corporation | Updated Example_Instances, Related_Attack_Patterns |