Reference control
Control over paths, routes, or resource references that changes what the system can be made to touch next.
This is the first public slice of the internal library: grounded enough to be useful, small enough to stay legible. It exists to show recurring capability families, path roles, and examples without pretending the whole model is finished.
Identify what kind of control or exposure the case creates before jumping to severity labels.
Decide whether that capability is acting as foothold, leverage gain, boundary crossing, or a timing-sensitive move.
Use grounded examples to see which routes stay at disclosure and which survive toward stronger outcomes.
What kind of capability exists, such as reference control, disclosure, or execution influence.
What that capability is doing inside the route, such as foothold, leverage gain, boundary crossing, or state-window abuse.
What the route reaches if it survives validation, such as disclosure, privileged action, or execution.
The public layer is intentionally smaller than the internal corpus. It shows the currently strongest grounded families and examples without exposing every raw relationship or speculative category.
Control over paths, routes, or resource references that changes what the system can be made to touch next.
Exposure of information or state that materially improves the next transition in a route.
Access-control failure that lets a route reach states or actions outside the current sphere.
Exposure of a resource or execution surface to the wrong trust or execution sphere.
Attacker-controlled input or generated logic changes what code-like behavior the target executes.
The first meaningful capability that moves the route from theoretical to actionable.
A step that materially improves control, reachability, or certainty without being the final outcome.
Movement into a route space, trust zone, or execution sphere that should not have been reachable from the starting position.
Exploitation of a narrow timing or order window where the target checks one state and later acts on another.
| Example | Primitive families | Path roles | Strongest outcome |
|---|---|---|---|
| Apache HTTP Server CVE-2021-41773 / CVE-2021-42013 | Reference control, Disclosure, Sphere crossing | Foothold, Leverage gain, Boundary crossing | Disclosure -> execution under the right environment |
| Apache APISIX CVE-2021-43557 | Reference control, Authorization bypass, Sphere crossing | Boundary crossing, Leverage gain | Privileged route access and cross-sphere movement |
| Apache Struts CVE-2017-5638 / S2-045 | Execution influence, Data influence | Foothold, Leverage gain | Remote code execution |
| Apache Sling CVE-2024-23673 | Reference control, Sphere crossing | Boundary crossing, Leverage gain | Code execution in vulnerable configurations |
| Dirty COW CVE-2016-5195 | Sequencing manipulation | Leverage gain, State-window abuse | Administrative privilege gain |
The internal library is broader and still evolving. The public surface is intentionally selective so the model stays legible and the strongest grounded patterns are easy to compare.
Read the thesis for the conceptual model, use the reference docs for the source-facing layer, and expect the public library slice to expand only when new records materially improve the structure.