Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 115 | Authentication Bypass |
Spider
Using an automated tool, an attacker follows all public links on a web site. They record all the links they find.
Technique |
---|
Use a spidering tool to follow and record all links. |
Use a proxy tool to record all links visited during a manual traversal of the web application. |
Attempt well-known or guessable resource locations
Using an automated tool, an attacker requests a variety of well-known URLs that correspond to administrative, debugging, or other useful internal actions. They record all the positive responses from the server.
Technique |
---|
Use a spidering tool to follow and record attempts on well-known URLs. |
Use a proxy tool to record all links visited during a manual traversal of attempts on well-known URLs. |
Use unauthorized resources
By visiting the unprotected resource, the attacker makes use of unauthorized functionality.
Technique |
---|
Access unprotected functions and execute them. |
View unauthorized data
The attacker discovers and views unprotected sensitive data.
Technique |
---|
Direct request of protected pages that directly access database back-ends. (e.g., list.jsp, accounts.jsp, status.jsp, etc.) |
Forcibly browseable pages can be discovered by using a number of automated tools. Doing the same manually is tedious but by no means difficult.
Scope | Likelihood | Impact | Note |
---|---|---|---|
Confidentiality | N/A | Read Data | N/A |
ConfidentialityAccess ControlAuthorization | N/A | Bypass Protection Mechanism | N/A |
Taxonomy Name | Entry ID | Entry Name |
---|---|---|
WASC | 34 | Predictable Resource Location |
OWASP Attacks | N/A | Forced browsing |