Home > CAPEC List > CAPEC-363: WASC-30 - Mail Command Injection (Version 3.0)  

CAPEC-363: WASC-30 - Mail Command Injection

Category ID: 363
 
Status: Draft
+ Summary
This category is related to the WASC Threat Classification 2.0 item Mail Command Injection
+ Membership
NatureTypeIDName
MemberOfViewView - A view in CAPEC represents a perspective with which one might look at the collection of attack patterns defined within CAPEC. There are three different types of views: graphs, explicit slices, and implicit slices.333WASC Threat Classification 2.0
HasMemberStandard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern.134Email Injection
+ References
[REF-306] "WASC Threat Classification 2.0". WASC-30 - Mail Command Injection. The Web Application Security Consortium (WASC). 2010. <http://projects.webappsec.org/Mail-Command-Injection>.
+ Content History
Submissions
Submission DateSubmitterOrganization
2014-06-23CAPEC Content TeamThe MITRE Corporation
Modifications
Modification DateModifierOrganization
2017-08-04CAPEC Content TeamThe MITRE Corporation
Updated Relationships

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2018