|
|
|
CAPEC-563: Add Malicious File to Shared Webroot |
Description An adversaries may add malicious content to a website through the open file share and then browse to that content with a web browser to cause the server to execute the content. The malicious content will typically run under the context and permissions of the web server process, often resulting in local system or administrative privileges depending on how the web server is configured. Mitigations
Ensure proper permissions on directories that are accessible through a web server. Disallow remote access to the web root. Disable execution on directories within the web root. Ensure that permissions of the web server process are only what is required by not using built-in accounts and instead create specific accounts to limit unnecessary access or permissions overlap across multiple systems. |
Taxonomy Mappings CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.Relevant to the ATT&CK taxonomy mapping (see
parent
) Content History Submissions |
---|
Submission Date | Submitter | Organization |
---|
2015-11-09 (Version 2.7) | CAPEC Content Team | The MITRE Corporation | | Modifications |
---|
Modification Date | Modifier | Organization |
---|
2019-04-04 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | 2020-07-30 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | Updated Taxonomy_Mappings |
More information is available — Please select a different filter.
|