CAPEC-154 - Resource Location Spoofing

An adversary, in an attempt to leverage an alternate of malicious resource, causes an application to look for a resource in an unintended location. This differs from a resource manipulation attack in which the contents of the resource are affected or where the resources themselves are physically altered or moved. Instead, this attack simply concerns itself with the paths used to find or create resources.

Severity

Likelihood

Confidentiality

Integrity

Availability

None. All applications rely on file paths and so, in theory, they or their resources could be affected by this attack.

No special resources are required for most variants of this attack.