CAPEC-40 - Manipulating Writeable Terminal Devices

This attack exploits terminal devices that allow themselves to be written to by other users. The attacker sends command strings to the target terminal device hoping that the target user will hit enter and thereby execute the malicious command with their privileges. The attacker can send the results (such as copying /etc/passwd) to a known directory and collect once the attack has succeeded.






  • Attack Methods 1
  • Injection
  • Purposes 1
  • Exploitation
  • Scopes 3
  • Gain privileges / assume identity
  • Authorization
  • Access_Control
  • Confidentiality
  • Read application data
  • Confidentiality
  • Execute unauthorized code or commands
  • Availability
  • Integrity
  • Confidentiality

Low level:

User terminals must have a permissive access control such as world writeable that allows normal users to control data on other user's terminals.

Access to a terminal on the target network

Design: Ensure that terminals are only writeable by named owner user and/or administrator

Design: Enforce principle of least privilege