| Home > CAPEC List > CAPEC-39: Manipulating Opaque Client-based Data Tokens (Version 3.9) |
|
High
Medium
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 22 | Exploiting Trust in Client |
| ParentOf | Detailed Attack PatternDetailed Attack Pattern - A detailed level attack pattern in CAPEC provides a low level of detail, typically leveraging a specific technique and targeting a specific technology, and expresses a complete execution flow. Detailed attack patterns are more specific than meta attack patterns and standard attack patterns and often require a specific protection mechanism to mitigate actual attacks. A detailed level attack pattern often will leverage a number of different standard level attack patterns chained together to accomplish a goal. | 31 | Accessing/Intercepting/Modifying HTTP Cookies |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Subvert Access Control |
Enumerate information passed to client side: The attacker identifies the parameters used as part of tokens to take business or security decisions
| Techniques |
|---|
| Use WebScarab to reveal hidden fields while browsing. |
| Use a sniffer to capture packets |
| View source of web page to find hidden fields |
| Examine URL to see if any opaque tokens are in it |
| Disassemble or decompile client-side application |
| Use debugging tools such as File Monitor, Registry Monitor, Debuggers, etc. |
Determine protection mechanism for opaque token: The attacker determines the protection mechanism used to protect the confidentiality and integrity of these data tokens. They may be obfuscated or a full blown encryption may be used.
| Techniques |
|---|
| Look for signs of well-known character encodings |
| Look for cryptographic signatures |
| Look for delimiters or other indicators of structure |
Modify parameter/token values: Trying each parameter in turn, the attacker modifies the values
| Techniques |
|---|
| Modify tokens logically |
| Modify tokens arithmetically |
| Modify tokens bitwise |
| Modify structural components of tokens |
| Modify order of parameters/tokens |
Cycle through values for each parameter.: Depending on the nature of the application, the attacker now cycles through values of each parameter and observes the effects of this modification in the data returned by the server
| Techniques |
|---|
| Use network-level packet injection tools such as netcat |
| Use application-level data modification tools such as Tamper Data, WebScarab, TamperIE, etc. |
| Use modified client (modified by reverse engineering) |
| Use debugging tools to modify data in client |
| Scope | Impact | Likelihood |
|---|---|---|
Integrity | Modify Data | |
Confidentiality Access Control Authorization | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 353 | Missing Support for Integrity Check |
| 285 | Improper Authorization |
| 302 | Authentication Bypass by Assumed-Immutable Data |
| 472 | External Control of Assumed-Immutable Web Parameter |
| 565 | Reliance on Cookies without Validation and Integrity Checking |
| 315 | Cleartext Storage of Sensitive Information in a Cookie |
| 539 | Use of Persistent Cookies Containing Sensitive Information |
| 384 | Session Fixation |
| 233 | Improper Handling of Parameters |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2017年01月09日 (Version 2.9) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2019年04月04日 (Version 3.1) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated Example_Instances | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||