Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 22 | Exploiting Trust in Client |
ParentOf | D | 31 | Accessing/Intercepting/Modifying HTTP Cookies |
Enumerate information passed to client side
The attacker identifies the parameters used as part of tokens to take business or security decisions
Technique |
---|
Use WebScarab to reveal hidden fields while browsing. |
Use a sniffer to capture packets |
View source of web page to find hidden fields |
Examine URL to see if any opaque tokens are in it |
Disassemble or decompile client-side application |
Use debugging tools such as File Monitor, Registry Monitor, Debuggers, etc. |
Determine protection mechanism for opaque token
The attacker determines the protection mechanism used to protect the confidentiality and integrity of these data tokens. They may be obfuscated or a full blown encryption may be used.
Technique |
---|
Look for signs of well-known character encodings |
Look for cryptographic signatures |
Look for delimiters or other indicators of structure |
Modify parameter/token values
Trying each parameter in turn, the attacker modifies the values
Technique |
---|
Modify tokens logically |
Modify tokens arithmetically |
Modify tokens bitwise |
Modify structural components of tokens |
Modify order of parameters/tokens |
Cycle through values for each parameter.
Depending on the nature of the application, the attacker now cycles through values of each parameter and observes the effects of this modification in the data returned by the server
Technique |
---|
Use network-level packet injection tools such as netcat |
Use application-level data modification tools such as Tamper Data, WebScarab, TamperIE, etc. |
Use modified client (modified by reverse engineering) |
Use debugging tools to modify data in client |
If the client site token is obfuscated.
If the client site token is encrypted.
Scope | Likelihood | Impact | Note |
---|---|---|---|
Integrity | N/A | Modify Data | N/A |
ConfidentialityAccess ControlAuthorization | N/A | Gain Privileges | N/A |
ID | Name |
---|---|
CWE-233 | Improper Handling of Parameters |
CWE-285 | Improper Authorization |
CWE-302 | Authentication Bypass by Assumed-Immutable Data |
CWE-315 | Cleartext Storage of Sensitive Information in a Cookie |
CWE-353 | Missing Support for Integrity Check |
CWE-384 | Session Fixation |
CWE-472 | External Control of Assumed-Immutable Web Parameter |
CWE-539 | Use of Persistent Cookies Containing Sensitive Information |
CWE-565 | Reliance on Cookies without Validation and Integrity Checking |
Taxonomy Name | Entry ID | Entry Name |
---|