Resource Location Attacks |
Attack Pattern ID: 154 (Standard Attack Pattern Completeness: Stub) | Typical Severity: Medium | Status: Draft |
Summary
An attacker utilizes discovered or crafted file path information for the purpose of locating and exploiting a security sensitive resource. This category of attack involves the paths used by an application to store or retrieve resources. Specifically, attacks in this category involve manipulating the path, causing the application to look in location unintended by the application maintainer, or determining the paths through prediction or lookup. This differs from File Manipulation attacks in which the contents of the files are affected or where the files themselves are physically moved. Instead, this attack simply concerns itself with the paths used to find or create resources.
None. All applications rely on file paths and so, in theory, they or their resources could be affected by this attack.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 262 | Resource Manipulation | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 38 | Leveraging/Manipulating Configuration File Search Paths | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 126 | Path Traversal | Mechanism of Attack1000 | |
ParentOf | ![]() | 127 | Directory Indexing | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 150 | Common resource location exploration | Mechanism of Attack (primary)1000 |