CAPEC-CAPEC-76 - CERT CVE
Naziv

Manipulating Web Input to File System Calls

Sažetak An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.
Preduvjeti Program must allow for user controlled variables to be applied directly to the filesystem
Rješenja ['Design: Enforce principle of least privilege.', 'Design: Ensure all input is validated, and does not contain file system commands', 'Design: Run server interfaces with a non-root account and/or utilize chroot jails or other configuration techniques to constrain privileges even if attacker gains some limited access to commands.', 'Design: For interactive user applications, consider if direct file system interface is necessary, instead consider having the application proxy communication.', 'Implementation: Perform testing such as pen-testing and vulnerability scanning to identify directories, programs, and interfaces that grant direct access to executables.']