Home > CAPEC List > CAPEC-154: Resource Location Spoofing (Version 2.10)  

CAPEC-154: Resource Location Spoofing

 
Resource Location Spoofing
Definition in a New Window Definition in a New Window
Attack Pattern ID: 154
Abstraction: Meta
Status: Stable
Completeness: Complete
Presentation Filter:
+ Summary

An adversary, in an attempt to leverage an alternate or malicious resource, causes an application to look for a resource in an unintended location. This differs from a resource manipulation attack in which the contents of the resource are affected or where the resources themselves are physically altered or moved. Instead, this attack simply concerns itself with the paths used to find or create resources.

+ Attack Prerequisites
  • None. All applications rely on file paths and therefore, in theory, they or their resources could be affected by this type of attack.

+ Typical Severity

Medium

+ Typical Likelihood of Exploit

Likelihood: Medium

+ Resources Required

No special resources are required for most variants of this attack.

+ Solutions and Mitigations

Monitor network activity to detect any anomalous or unauthorized communication exchanges.

+ Attack Motivation-Consequences
ScopeTechnical ImpactNote
Authorization
Execute unauthorized code or commands
Run Arbitrary Code
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated Description SummaryInternal
CAPEC Content TeamThe MITRE Corporation2017-05-01Updated Attack_Motivation-Consequences, Attack_Prerequisites, Solutions_and_Mitigations, Typical_Likelihood_of_ExploitInternal
More information is available — Please select a different filter.
Page Last Updated or Reviewed: May 01, 2017