CAPEC-635 Alternative Execution Due to Deceptive Filenames

CAPEC ID: 635

CAPEC-635 Metadata

Likelihood of Attack

Low

Typical Severity

High

Overview

Summary

The extension of a file name is often used in various contexts to determine the application that is used to open and use it. If an attacker can cause an alternative application to be used, it may be able to execute malicious code, cause a denial of service or expose sensitive information.

Prerequisites

The use of the file must be controlled by the file extension.

Potential Solutions / Mitigations

Applications should insure that the content of the file is consistent with format it is expecting, and not depend solely on the file extension.

Related Weaknesses (CWE)

CWE ID Description
CWE-162 Improper Neutralization of Trailing Special Elements

Related CAPECs

CAPEC ID Description
CAPEC-165 An attacker modifies file contents or attributes (such as extensions or names) of files in a manner to cause incorrect processing by an application. Attackers use this class of attacks to cause applications to enter unstable states, overwrite or expose sensitive information, and even execute arbitrary code with the application's privileges. This class of attacks differs from attacks on configuration information (even if file-based) in that file manipulation causes the file processing to result in non-standard behaviors, such as buffer overflows or use of the incorrect interpreter. Configuration attacks rely on the application interpreting files correctly in order to insert harmful configuration information. Likewise, resource location attacks rely on controlling an application's ability to locate files, whereas File Manipulation attacks do not require the application to look in a non-default location, although the two classes of attacks are often combined.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1036.007 Masquerading: Double File Extension

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.