Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-31:Accessing/Intercepting/Modifying HTTP Cookies
Attack Pattern ID:31
Version:v3.9
Attack Pattern Name:Accessing/Intercepting/Modifying HTTP Cookies
Abstraction:Detailed
Status:Draft
Likelihood of Attack:High
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
11Weaknesses found

CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
ShareView Details
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in65CVEs

The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.

Impacts-
Modify Application DataGain Privileges or Assume Identity
Tags-
Input ValidationOutput EncodingWeb Based (technology class)Modify Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section
CWE-20
Improper Input Validation
ShareView Details
Improper Input Validation
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in11448CVEs

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Impacts-
Read Files or DirectoriesExecute Unauthorized Code or CommandsDoS: Resource Consumption (Memory)Read MemoryDoS: Crash, Exit, or RestartDoS: Resource Consumption (CPU)Modify Memory
Tags-
High exploitLibraries or FrameworksInput ValidationAttack Surface ReductionExecute Unauthorized Code or Commands (impact)DoS: Resource Consumption (CPU) (impact)Read Files or Directories (impact)Read Memory (impact)DoS: Crash, Exit, or Restart (impact)DoS: Resource Consumption (Memory) (impact)Modify Memory (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2021 CWE Top 25 Most Dangerous Software2020 CWE Top 25 Most Dangerous Software2022 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous SoftwareOriginally Used by NVD from 2008 to 2016Simplified Mapping of Published Vulnerabilities
CWE-302
Authentication Bypass by Assumed-Immutable Data
ShareView Details
Authentication Bypass by Assumed-Immutable Data
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in27CVEs

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

Impacts-
Bypass Protection Mechanism
Tags-
Bypass Protection Mechanism (impact)
As Seen In-
Not Available
CWE-311
Missing Encryption of Sensitive Data
ShareView Details
Missing Encryption of Sensitive Data
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in489CVEs

The product does not encrypt sensitive or critical information before storage or transmission.

Impacts-
Read Application DataModify Application Data
Tags-
High exploitLibraries or FrameworksSeparation of PrivilegeAttack Surface ReductionModify Application Data (impact)Read Application Data (impact)
As Seen In-
CISQ Data Protection MeasuresSimplified Mapping of Published Vulnerabilities
CWE-315
Cleartext Storage of Sensitive Information in a Cookie
ShareView Details
Cleartext Storage of Sensitive Information in a Cookie
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in7CVEs

The product stores sensitive information in cleartext in a cookie.

Impacts-
Read Application Data
Tags-
Read Application Data (impact)
As Seen In-
Not Available
CWE-384
Session Fixation
ShareView Details
Session Fixation
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Compound
Found in352CVEs

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

Impacts-
Gain Privileges or Assume Identity
Tags-
Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-472
External Control of Assumed-Immutable Web Parameter
ShareView Details
External Control of Assumed-Immutable Web Parameter
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in48CVEs

The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.

Impacts-
Modify Application Data
Tags-
Input ValidationModify Application Data (impact)
As Seen In-
Not Available
CWE-539
Use of Persistent Cookies Containing Sensitive Information
ShareView Details
Use of Persistent Cookies Containing Sensitive Information
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in4CVEs

The web application uses persistent cookies, but the cookies contain sensitive information.

Impacts-
Read Application Data
Tags-
Read Application Data (impact)
As Seen In-
Not Available
CWE-565
Reliance on Cookies without Validation and Integrity Checking
ShareView Details
Reliance on Cookies without Validation and Integrity Checking
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in61CVEs

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

Impacts-
Modify Application DataGain Privileges or Assume IdentityExecute Unauthorized Code or Commands
Tags-
Execute Unauthorized Code or Commands (impact)Modify Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-602
Client-Side Enforcement of Server-Side Security
ShareView Details
Client-Side Enforcement of Server-Side Security
Likelihood of Exploit-Medium
Mapping-Allowed-with-Review
Abstraction-Class
Found in69CVEs

The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.

Impacts-
Bypass Protection MechanismDoS: Crash, Exit, or RestartGain Privileges or Assume Identity
Tags-
Medium exploitICS/OT (technology class)Mobile (technology class)Bypass Protection Mechanism (impact)DoS: Crash, Exit, or Restart (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section
CWE-642
External Control of Critical State Data
ShareView Details
External Control of Critical State Data
Likelihood of Exploit-High
Mapping-Allowed-with-Review
Abstraction-Class
Found in13CVEs

The product stores security-critical state information about its users, or the product itself, in a location that is accessible to unauthorized actors.

Impacts-
Read Application DataBypass Protection MechanismDoS: Crash, Exit, or RestartGain Privileges or Assume Identity
Tags-
Web ServerHigh exploitEnvironment HardeningLibraries or FrameworksAttack Surface ReductionBypass Protection Mechanism (impact)DoS: Crash, Exit, or Restart (impact)Read Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section