Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-93:Log Injection-Tampering-Forging
Attack Pattern ID:93
Version:v3.9
Attack Pattern Name:Log Injection-Tampering-Forging
Abstraction:Detailed
Status:Draft
Likelihood of Attack:High
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
3Weaknesses found

CWE-117
Improper Output Neutralization for Logs
ShareView Details
Improper Output Neutralization for Logs
Likelihood of Exploit-Medium
Mapping-Allowed
Abstraction-Base
Found in76CVEs

The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file.

Impacts-
Hide ActivitiesExecute Unauthorized Code or CommandsModify Application Data
Tags-
Medium exploitInput ValidationOutput EncodingExecute Unauthorized Code or Commands (impact)Modify Application Data (impact)Hide Activities (impact)
As Seen In-
CWE Cross-section
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences
ShareView Details
Improper Neutralization of Escape, Meta, or Control Sequences
Likelihood of Exploit-Not Available
Mapping-Allowed
Abstraction-Variant
Found in33CVEs

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.

Impacts-
Unexpected State
Tags-
Input ValidationOutput EncodingUnexpected State (impact)
As Seen In-
Not Available
CWE-75
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
ShareView Details
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Likelihood of Exploit-Not Available
Mapping-Discouraged
Abstraction-Class
Found in31CVEs

The product does not adequately filter user-controlled input for special elements with control implications.

Impacts-
Execute Unauthorized Code or CommandsModify Application Data
Tags-
Execute Unauthorized Code or Commands (impact)Modify Application Data (impact)
As Seen In-
Not Available