Home > CAPEC List > CAPEC-149: Explore for Predictable Temporary File Names (Version 2.11)  

CAPEC-149: Explore for Predictable Temporary File Names

 
Explore for Predictable Temporary File Names
Definition in a New Window Definition in a New Window
Attack Pattern ID: 149
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker explores a target to identify the names and locations of predictable temporary files for the purpose of launching further attacks against the target. This involves analyzing naming conventions and storage locations of the temporary files created by a target application. If an attacker can predict the names of temporary files they can use this information to mount other attacks, such as information gathering and symlink attacks.

+ Attack Prerequisites
  • The targeted application must create names for temporary files using a predictable procedure, e.g. using sequentially increasing numbers.

  • The attacker must be able to see the names of the files the target is creating.

+ Typical Severity

Medium

+ Resources Required

None: No specialized resources are required to execute this type of attack.

+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2017-01-09Updated Related_Attack_PatternsInternal
CAPEC Content TeamThe MITRE Corporation2017-08-04Updated Attack_Prerequisites, Resources_RequiredInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017