An adversary exploits weaknesses in input validation by manipulating resource identifiers enabling the unintended modification or specification of a resource.
The target application allows the user to both specify the identifier used to access a system resource. Through this permission, the user gains the capability to perform actions on that resource (e.g., overwrite the file)
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
Scope
Likelihood
Impact
Note
Confidentiality
N/A
Read Data
N/A
Integrity
N/A
Modify Data
N/A
Scope: Confidentiality
Likelihood: N/A
Impact: Read Data
Note: N/A
Scope: Integrity
Likelihood: N/A
Impact: Modify Data
Note: N/A
▼Mitigations
Ensure all input content that is delivered to client is sanitized against an acceptable content specification.