| Home > CAPEC List > CAPEC-31: Accessing/Intercepting/Modifying HTTP Cookies (Version 3.9) |
|
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 39 | Manipulating Opaque Client-based Data Tokens |
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 157 | Sniffing Attacks |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Communications |
| Mechanisms of Attack | Collect and Analyze Information, Subvert Access Control |
Obtain copy of cookie: The adversary first needs to obtain a copy of the cookie. The adversary may be a legitimate end user wanting to escalate privilege, or could be somebody sniffing on a network to get a copy of HTTP cookies.
| Techniques |
|---|
| Sniff cookie using a network sniffer such as Wireshark |
| Obtain cookie using a utility such as the Firefox Cookie Manager, Chrome DevTools or AnEC Cookie Editor. |
| Steal cookie via a cross-site scripting attack. |
| Guess cookie contents if it contains predictable information. |
Obtain sensitive information from cookie: The adversary may be able to get sensitive information from the cookie. The web application developers may have assumed that cookies are not accessible by end users, and thus, may have put potentially sensitive information in them.
| Techniques |
|---|
| If cookie shows any signs of being encoded using a standard scheme such as base64, decode it. |
| Analyze the cookie's contents to determine whether it contains any sensitive information. |
Modify cookie to subvert security controls.: The adversary may be able to modify or replace cookies to bypass security controls in the application.
| Techniques |
|---|
| Modify logical parts of cookie and send it back to server to observe the effects. |
| Modify numeric parts of cookie arithmetically and send it back to server to observe the effects. |
| Modify cookie bitwise and send it back to server to observe the effects. |
| Replace cookie with an older legitimate cookie and send it back to server to observe the effects. This technique would be helpful in cases where the cookie contains a "points balance" for a given user where the points have some value. The user may spend their points and then replace their cookie with an older one to restore their balance. |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality | Read Data | |
Integrity | Modify Data | |
Confidentiality Access Control Authorization | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 565 | Reliance on Cookies without Validation and Integrity Checking |
| 302 | Authentication Bypass by Assumed-Immutable Data |
| 311 | Missing Encryption of Sensitive Data |
| 113 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') |
| 539 | Use of Persistent Cookies Containing Sensitive Information |
| 20 | Improper Input Validation |
| 315 | Cleartext Storage of Sensitive Information in a Cookie |
| 384 | Session Fixation |
| 472 | External Control of Assumed-Immutable Web Parameter |
| 602 | Client-Side Enforcement of Server-Side Security |
| 642 | External Control of Critical State Data |
| Entry ID | Entry Name |
|---|---|
| 1539 | Steal Web Session Cookie |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2017年01月09日 (Version 2.9) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2017年08月04日 (Version 2.11) | CAPEC Content Team | The MITRE Corporation |
| Updated Attack_Phases, Attack_Prerequisites, Description Summary, Examples-Instances, Payload_Activation_Impact, Resources_Required | ||
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated Execution_Flow, Related_Attack_Patterns | ||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation |
| Updated Execution_Flow, Related_Attack_Patterns | ||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation |
| Updated Example_Instances, Related_Weaknesses | ||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation |
| Updated Taxonomy_Mappings | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||