| Home > CAPEC List > CAPEC-57: Utilizing REST's Trust in the System Resource to Obtain Sensitive Data (Version 3.9) |
|
Rest applications premise is that they leverage existing infrastructure to deliver web services functionality. An example of this is a Rest application that uses HTTP Get methods and receives a HTTP response with an XML document. These Rest style web services are deployed on existing infrastructure such as Apache and IIS web servers with no SOAP stack required.
Unfortunately from a security standpoint, there frequently is no interoperable identity security mechanism deployed, so Rest developers often fall back to SSL to deliver security. In large data centers, SSL is typically terminated at the edge of the network - at the firewall, load balancer, or router. Once the SSL is terminated the HTTP request is in the clear (unless developers have hashed or encrypted the values, but this is rare). The adversary can utilize a sniffer such as Wireshark to snapshot the credentials, such as username and password that are passed in the clear once SSL is terminated. Once the adversary gathers these credentials, they can submit requests to the web service provider just as authorized user do. There is not typically an authentication on the client side, beyond what is passed in the request itself so once this is compromised, then this is generally sufficient to compromise the service's authentication scheme.
Medium
Very High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. | 157 | Sniffing Attacks |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software, Communications |
| Mechanisms of Attack | Collect and Analyze Information |
Find a REST-style application that uses SSL: The adversary must first find a REST-style application that uses SSL to target. Because this attack is easier to carry out from inside of a server network, it is likely that an adversary could have inside knowledge of how services operate.
Insert a listener to sniff client-server communication: The adversary inserts a listener that must exist beyond the point where SSL is terminated. This can be placed on the client side if it is believed that sensitive information is being sent to the client as a response, although most often the listener will be placed on the server side to listen for client authentication information.
| Techniques |
|---|
| Run wireshark or tcpdump on a device that is on the inside of a firewall, load balancer, or router of a network and capture traffic after SSL has been terminated |
Gather information passed in the clear: If developers have not hashed or encrypted data sent in the sniffed request, the adversary will be able to read this data in the clear. Most commonly, they will now have a username or password that they can use to submit requests to the web service just as an authorized user
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality Access Control Authorization | Gain Privileges |
| CWE-ID | Weakness Name |
|---|---|
| 300 | Channel Accessible by Non-Endpoint |
| 287 | Improper Authentication |
| 693 | Protection Mechanism Failure |
| Entry ID | Entry Name |
|---|---|
| 1040 | Network Sniffing |
| Submissions | |||
|---|---|---|---|
| Submission Date | Submitter | Organization | |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | |
| Modifications | |||
| Modification Date | Modifier | Organization | |
| 2019年09月30日 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | |
| Updated @Name, Description, Related_Attack_Patterns | |||
| 2021年06月24日 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | |
| Updated Related_Weaknesses | |||
| 2021年10月21日 (Version 3.6) | CAPEC Content Team | The MITRE Corporation | |
| Updated Execution_Flow | |||
| 2022年02月22日 (Version 3.7) | CAPEC Content Team | The MITRE Corporation | |
| Updated Description, Example_Instances, Extended_Description, Prerequisites | |||
| 2022年09月29日 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | |
| Updated Taxonomy_Mappings | |||
| Previous Entry Names | |||
| Change Date | Previous Entry Name | ||
| 2019年09月30日 (Version 3.2) | Utilizing REST's Trust in the System Resource to Register Man in the Middle | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||