Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-85:AJAX Footprinting
Attack Pattern ID:85
Version:v3.9
Attack Pattern Name:AJAX Footprinting
Abstraction:Detailed
Status:Draft
Likelihood of Attack:High
Typical Severity:Low
DetailsContent HistoryRelated WeaknessesReports
9Weaknesses found

CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
ShareView Details
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in73CVEs

The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.

Impacts-
Gain Privileges or Assume IdentityModify Application Data
Tags-
Input ValidationOutput EncodingWeb Based (technology class)Modify Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section
CWE-116
Improper Encoding or Escaping of Output
ShareView Details
Improper Encoding or Escaping of Output
Likelihood of Exploit-High
Mapping-Allowed-with-Review
Abstraction-Class
Found in371CVEs

The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.

Impacts-
Bypass Protection MechanismExecute Unauthorized Code or CommandsModify Application Data
Tags-
AI/MLWeb ServerDatabase ServerHigh exploitLibraries or FrameworksParameterizationExecute Unauthorized Code or Commands (impact)Bypass Protection Mechanism (impact)Modify Application Data (impact)
As Seen In-
Simplified Mapping of Published Vulnerabilities
CWE-184
Incomplete List of Disallowed Inputs
ShareView Details
Incomplete List of Disallowed Inputs
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in68CVEs

The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not allowed by policy or otherwise require other action to neutralize before additional processing takes place, but the list is incomplete.

Impacts-
Bypass Protection Mechanism
Tags-
Input ValidationBypass Protection Mechanism (impact)
As Seen In-
Not Available
CWE-20
Improper Input Validation
ShareView Details
Improper Input Validation
Likelihood of Exploit-High
Mapping-Discouraged
Abstraction-Class
Found in11826CVEs

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Impacts-
DoS: Resource Consumption (CPU)Execute Unauthorized Code or CommandsRead Files or DirectoriesDoS: Resource Consumption (Memory)Modify MemoryRead MemoryDoS: Crash, Exit, or Restart
Tags-
High exploitLibraries or FrameworksInput ValidationAttack Surface ReductionExecute Unauthorized Code or Commands (impact)DoS: Resource Consumption (CPU) (impact)Read Files or Directories (impact)Read Memory (impact)DoS: Crash, Exit, or Restart (impact)DoS: Resource Consumption (Memory) (impact)Modify Memory (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2021 CWE Top 25 Most Dangerous Software2020 CWE Top 25 Most Dangerous Software2022 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous SoftwareOriginally Used by NVD from 2008 to 2016Simplified Mapping of Published Vulnerabilities
CWE-348
Use of Less Trusted Source
ShareView Details
Use of Less Trusted Source
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in33CVEs

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Impacts-
Bypass Protection MechanismGain Privileges or Assume Identity
Tags-
Bypass Protection Mechanism (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section
CWE-692
Incomplete Denylist to Cross-Site Scripting
ShareView Details
Incomplete Denylist to Cross-Site Scripting
Likelihood of Exploit-Not Available
Mapping-Discouraged
Abstraction-Compound
Found in6CVEs

The product uses a denylist-based protection mechanism to defend against XSS attacks, but the denylist is incomplete, allowing XSS variants to succeed.

Impacts-
Execute Unauthorized Code or Commands
Tags-
Execute Unauthorized Code or Commands (impact)
As Seen In-
Not Available
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
ShareView Details
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Likelihood of Exploit-High
Mapping-Allowed
Abstraction-Base
Found in42709CVEs

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Impacts-
Bypass Protection MechanismExecute Unauthorized Code or CommandsRead Application Data
Tags-
High exploitEnvironment HardeningLibraries or FrameworksInput ValidationParameterizationOutput EncodingFirewallAttack Surface ReductionEnforcement by ConversionWeb Based (technology class)Execute Unauthorized Code or Commands (impact)Bypass Protection Mechanism (impact)Read Application Data (impact)
As Seen In-
2019 CWE Top 25 Most Dangerous Software Errors2021 CWE Top 25 Most Dangerous SoftwareCISQ Data Protection Measures2020 CWE Top 25 Most Dangerous Software2022 CWE Top 25 Most Dangerous Software2023 CWE Top 25 Most Dangerous Software2024 CWE Top 25 Most Dangerous SoftwareOriginally Used by NVD from 2008 to 2016CWE Cross-section
CWE-86
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
ShareView Details
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in10CVEs

The product does not neutralize or incorrectly neutralizes invalid characters or byte sequences in the middle of tag names, URI schemes, and other identifiers.

Impacts-
Execute Unauthorized Code or CommandsRead Application Data
Tags-
Output EncodingAttack Surface ReductionExecute Unauthorized Code or Commands (impact)Read Application Data (impact)
As Seen In-
Not Available
CWE-96
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
ShareView Details
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Base
Found in23CVEs

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before inserting the input into an executable resource, such as a library, configuration file, or template.

Impacts-
Execute Unauthorized Code or CommandsGain Privileges or Assume IdentityRead Application DataRead Files or DirectoriesBypass Protection MechanismHide Activities
Tags-
PerlInput ValidationOutput EncodingInterpretedExecute Unauthorized Code or Commands (impact)Bypass Protection Mechanism (impact)Read Files or Directories (impact)Hide Activities (impact)Read Application Data (impact)Gain Privileges or Assume Identity (impact)
As Seen In-
CWE Cross-section