Home > CAPEC List > CAPEC-160: Exploit Script-Based APIs (Version 2.11)  

CAPEC-160: Exploit Script-Based APIs

Exploit Script-Based APIs
Definition in a New Window Definition in a New Window
Attack Pattern ID: 160
Abstraction: Standard
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

Some APIs support scripting instructions as arguments. Methods that take scripted instructions (or references to scripted instructions) can be very flexible and powerful. However, if an attacker can specify the script that serves as input to these methods they can gain access to a great deal of functionality. For example, HTML pages support <script> tags that allow scripting languages to be embedded in the page and then interpreted by the receiving web browser. If the content provider is malicious, these scripts can compromise the client application. Some applications may even execute the scripts under their own identity (rather than the identity of the user providing the script) which can allow attackers to perform activities that would otherwise be denied to them.

+ Attack Prerequisites
  • The target application must include the use of APIs that execute scripts.

  • The target application must allow the attacker to provide some or all of the arguments to one of these script interpretation methods and must fail to adequately filter these arguments for dangerous or unwanted script commands.

+ Typical Severity


+ Resources Required

None: No specialized resources are required to execute this type of attack.

+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
CAPEC Content TeamThe MITRE Corporation2015-12-07Updated Description SummaryInternal
CAPEC Content TeamThe MITRE Corporation2017-08-04Updated Resources_RequiredInternal
Previous Entry Names
DatePrevious Entry Name
2015-12-07Programming to included script-based APIs

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017