An adversary deceives an application or user and convinces them to request a resource from an unintended location. By spoofing the location, the adversary can cause an alternate resource to be used, often one that the adversary controls and can be used to help them achieve their malicious goals.
None. All applications rely on file paths and therefore, in theory, they or their resources could be affected by this type of attack.
Typical Likelihood of Exploit
None: No specialized resources are required to execute this type of attack.
Solutions and Mitigations
Monitor network activity to detect any anomalous or unauthorized communication exchanges.
More information is available — Please select a different filter.
Page Last Updated or Reviewed:
July 31, 2017
Use of the Common Attack Pattern Enumeration and Classification dictionary and classification taxonomy, and the associated references from this website, are subject to the