| Home > CAPEC List > CAPEC-87: Forceful Browsing (Version 3.9) |
|
High
High
| Nature | Type | ID | Name |
|---|---|---|---|
| ChildOf | Meta Attack PatternMeta Attack Pattern - A meta level attack pattern in CAPEC is a decidedly abstract characterization of a specific methodology or technique used in an attack. A meta attack pattern is often void of a specific technology or implementation and is meant to provide an understanding of a high level approach. A meta level attack pattern is a generalization of related group of standard level attack patterns. Meta level attack patterns are particularly useful for architecture and design level threat modeling exercises. | 115 | Authentication Bypass |
| View Name | Top Level Categories |
|---|---|
| Domains of Attack | Software |
| Mechanisms of Attack | Subvert Access Control |
Spider: Using an automated tool, an attacker follows all public links on a web site. They record all the links they find.
| Techniques |
|---|
| Use a spidering tool to follow and record all links. |
| Use a proxy tool to record all links visited during a manual traversal of the web application. |
Attempt well-known or guessable resource locations: Using an automated tool, an attacker requests a variety of well-known URLs that correspond to administrative, debugging, or other useful internal actions. They record all the positive responses from the server.
| Techniques |
|---|
| Use a spidering tool to follow and record attempts on well-known URLs. |
| Use a proxy tool to record all links visited during a manual traversal of attempts on well-known URLs. |
Use unauthorized resources: By visiting the unprotected resource, the attacker makes use of unauthorized functionality.
| Techniques |
|---|
| Access unprotected functions and execute them. |
View unauthorized data: The attacker discovers and views unprotected sensitive data.
| Techniques |
|---|
| Direct request of protected pages that directly access database back-ends. (e.g., list.jsp, accounts.jsp, status.jsp, etc.) |
| Scope | Impact | Likelihood |
|---|---|---|
Confidentiality | Read Data | |
Confidentiality Access Control Authorization | Bypass Protection Mechanism |
A bulletin board application provides an administrative interface at admin.aspx when the user logging in belongs to the administrators group.
An attacker can access the admin.aspx interface by making a direct request to the page. Not having access to the interface appropriately protected allows the attacker to perform administrative functions without having to authenticate themself in that role.
| CWE-ID | Weakness Name |
|---|---|
| 425 | Direct Request ('Forced Browsing') |
| 285 | Improper Authorization |
| 693 | Protection Mechanism Failure |
| Entry ID | Entry Name |
|---|---|
| 34 | Predictable Resource Location |
| Entry Name |
|---|
| Forced browsing |
| Submissions | ||
|---|---|---|
| Submission Date | Submitter | Organization |
| 2014年06月23日 (Version 2.6) | CAPEC Content Team | The MITRE Corporation |
| Modifications | ||
| Modification Date | Modifier | Organization |
| 2015年12月07日 (Version 2.8) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns | ||
| 2017年08月04日 (Version 2.11) | CAPEC Content Team | The MITRE Corporation |
| Updated Related_Attack_Patterns, Resources_Required | ||
| 2018年07月31日 (Version 2.12) | CAPEC Content Team | The MITRE Corporation |
| Updated Attack_Phases, Attacker_Skills_or_Knowledge_Required, Typical_Likelihood_of_Exploit | ||
| 2020年07月30日 (Version 3.3) | CAPEC Content Team | The MITRE Corporation |
| Updated Example_Instances, Execution_Flow | ||
| 2020年12月17日 (Version 3.4) | CAPEC Content Team | The MITRE Corporation |
| Updated Description, Taxonomy_Mappings | ||
|
Use of the Common Attack Pattern Enumeration and Classification (CAPEC), and the associated references from this website are subject to the Terms of Use. Copyright © 2007–2025, The MITRE Corporation. CAPEC and the CAPEC logo are trademarks of The MITRE Corporation. |
||