Create files with the same name as files protected with a higher classification
Attack Pattern ID: 177 (Standard Attack Pattern Completeness: Stub)Typical Severity: Very HighStatus: Draft
+ Description

Summary

An attacker exploits file location algorithms in an operating system or application by creating a file with the same name as a protected or privileged file. The attacker could manipulate the system if the attacker-created file is trusted by the operating system or an application component that attempts to load the original file. Applications often load or include external files, such as libraries or configuration files. These files should be protected against malicious manipulation. However, if the application only uses the name of the file when locating it, an attacker may be able to create a file with the same name and place it in a directory that the application will search before the directory with the legitimate file is searched. Because the attacker's file is discovered first, it would be used by the target application. This attack can be extremely destructive if the referenced file is executable and/or is granted special privileges based solely on having a particular name.

+ Attack Prerequisites

The target application must exclude external files. Most non-trivial applications meet this criterion.

The target application does not verify that a located file is the one it was looking for through means other than the name. Many applications fail to perform checks of this type.

The directories the target application searches to find the included file include directories writable by the attacker which are searched before the protected directory containing the actual files. It is much less common for applications to meet this criterion, but if an attacker can manipulate the application's search path (possibly by controlling environmental variables) then they can force this criterion to be met.

+ Resources Required

The attacker must have sufficient access to place an arbitrarily named file somewhere early in the application's search path.

+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfAttack PatternAttack Pattern165File Manipulation 
Mechanism of Attack (primary)1000
+ References

http://www.securityinnovation.com/library/attacks/implementation.shtml