CAPEC-201: Serialized Data External Linking |
Description An adversary creates a serialized data file (e.g. XML, YAML, etc...) that contains an external data reference. Because serialized data parsers may not validate documents with external references, there may be no checks on the nature of the reference in the external data. This can allow an adversary to open arbitrary files or connections, which may further lead to the adversary gaining access to information on the system that they would normally be unable to obtain. Likelihood Of Attack Typical Severity Execution Flow Explore Survey the target: Using a browser or an automated tool, an adversary records all instances of web services that process requests with serialized data. | Techniques |
|---|
| Use an automated tool to record all instances of URLs that process requests with serialized data. | | Use a browser to manually explore the website and analyze how the application processes serialized data requests. |
Exploit Craft malicious payload: The adversary crafts malicious data message that contains references to sensitive files. Launch an External Linking attack: Send the malicious crafted message containing the reference to a sensitive file to the target URL.
Prerequisites
| The target must follow external data references without validating the validity of the reference target. |
Skills Required
[Level: Low] To send serialized data messages with maliciously crafted schema. |
Resources Required
| None: No specialized resources are required to execute this type of attack. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.| Scope | Impact | Likelihood |
|---|
Confidentiality | Read Data | |
Mitigations
| Configure the serialized data processor to only retrieve external entities from trusted sources. |
Example Instances
The following DTD would attempt to open the /dev/tty device: <!DOCTYPE doc [ <!ENTITY ent SYSTEM "file:///dev/tty"> ]> A malicious actor could use this crafted DTD to reveal sensitive information. |
The following XML snippet would attempt to open the /etc/passwd file: <foo xmlns:xi="http://www.w3.org/2001/XInclude"> <xi:include parse="text" href="file:///etc/passwd"/></foo> |
Taxonomy Mappings CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.Relevant to the ATT&CK taxonomy mapping (see
parent
) References Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Activation_Zone, Attack_Phases, Attacker_Skills_or_Knowledge_Required, Description, Description Summary, Examples-Instances, Injection_Vector, Methods_of_Attack, Payload, Payload_Activation_Impact, Resources_Required, Typical_Likelihood_of_Exploit, Typical_Severity | | 2018-07-31 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Phases, Description Summary, Related_Attack_Patterns, Related_Weaknesses | | 2020-07-30 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | | Updated @Name, Description, Execution_Flow, Mitigations, Skills_Required | | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | | Updated Consequences, Description | | 2021-10-21 (Version 3.6) | CAPEC Content Team | The MITRE Corporation | | Updated Description, Example_Instances, Execution_Flow, Prerequisites | | 2022-09-29 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | | Updated Example_Instances, Related_Attack_Patterns | | Previous Entry Names |
|---|
| Change Date | Previous Entry Name |
|---|
| 2018-07-31 (Version 2.12) | XML Entity Blowup | | | 2020-07-30 (Version 3.3) | XML Entity Linking | |
More information is available — Please select a different filter.
|