Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-39:Manipulating Opaque Client-based Data Tokens
Attack Pattern ID:39
Version:v3.9
Attack Pattern Name:Manipulating Opaque Client-based Data Tokens
Abstraction:Standard
Status:Draft
Likelihood of Attack:High
Typical Severity:Medium
DetailsContent HistoryRelated WeaknessesReports
9Weaknesses found

CWE-233
Improper Handling of Parameters
ShareView Details
Improper Handling of Parameters
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in22CVEs

The product does not properly handle when the expected number of parameters, fields, or arguments is not provided in input, or if those parameters are undefined.

Impacts-
Unexpected State
Tags-
Unexpected State (impact)
As Seen In-
Not Available
CWE-285
Improper Authorization
ShareView Details
Improper Authorization
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in835CVEs

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

Impacts-
Read Application DataGain Privileges or Assume IdentityRead Files or DirectoriesModify Files or DirectoriesModify Application Data
Tags-
Web ServerDatabase ServerHigh exploitLibraries or FrameworksModify Application Data (impact)Read Files or Directories (impact)Modify Files or Directories (impact)Read Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-302
Authentication Bypass by Assumed-Immutable Data
ShareView Details
Authentication Bypass by Assumed-Immutable Data
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in27CVEs

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

Impacts-
Bypass Protection Mechanism
Tags-
Bypass Protection Mechanism (impact)
As Seen In-
Not Available
CWE-315
Cleartext Storage of Sensitive Information in a Cookie
ShareView Details
Cleartext Storage of Sensitive Information in a Cookie
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in7CVEs

The product stores sensitive information in cleartext in a cookie.

Impacts-
Read Application Data
Tags-
Read Application Data (impact)
As Seen In-
Not Available
CWE-353
Missing Support for Integrity Check
ShareView Details
Missing Support for Integrity Check
Likelihood of Exploit-Medium
Mapping-Allowed
Abstraction-Base
Found in30CVEs

The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.

Impacts-
OtherHide Activities
Tags-
Medium exploitOther (impact)Hide Activities (impact)
As Seen In-
CWE Cross-section
CWE-384
Session Fixation
ShareView Details
Session Fixation
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Compound
Found in353CVEs

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

Impacts-
Gain Privileges or Assume Identity
Tags-
Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available
CWE-472
External Control of Assumed-Immutable Web Parameter
ShareView Details
External Control of Assumed-Immutable Web Parameter
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in48CVEs

The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.

Impacts-
Modify Application Data
Tags-
Input ValidationModify Application Data (impact)
As Seen In-
Not Available
CWE-539
Use of Persistent Cookies Containing Sensitive Information
ShareView Details
Use of Persistent Cookies Containing Sensitive Information
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in4CVEs

The web application uses persistent cookies, but the cookies contain sensitive information.

Impacts-
Read Application Data
Tags-
Read Application Data (impact)
As Seen In-
Not Available
CWE-565
Reliance on Cookies without Validation and Integrity Checking
ShareView Details
Reliance on Cookies without Validation and Integrity Checking
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in61CVEs

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

Impacts-
Gain Privileges or Assume IdentityExecute Unauthorized Code or CommandsModify Application Data
Tags-
Execute Unauthorized Code or Commands (impact)Modify Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
Not Available