Explore for predictable temporary file names |
Attack Pattern ID: 149 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Explore for predictable temporary file names |
Attack Pattern ID: 149 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Summary
An attacker explores a target to identify the names and locations of predictable temporary files for the purpose of launching further attacks against the target. This involves analyzing naming conventions and storage locations of the temporary files created by a target application. If an attacker can predict the names of temporary files they can use this information to mount other attacks, such as information gathering and symlink attacks.
The targeted application must create names for temporary files using a predictable procedure, e.g. using sequentially increasing numbers.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 150 | Common resource location exploration | Mechanism of Attack (primary)1000 |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.