CAPEC-274: HTTP Verb Tampering |
Description An attacker modifies the HTTP Verb (e.g. GET, PUT, TRACE, etc.) in order to bypass access restrictions. Some web environments allow administrators to restrict access based on the HTTP Verb used with requests. However, attackers can often provide a different HTTP Verb, or even provide a random string as a verb in order to bypass these protections. This allows the attacker to access data that should otherwise be protected. Typical Severity Prerequisites
The targeted system must attempt to filter access based on the HTTP verb used in requests. |
Resources Required
The attacker requires a tool that allows them to manually control the HTTP verb used to send messages to the targeted server. |
Mitigations
Design: Ensure that only legitimate HTTP verbs are allowed. |
Design: Do not use HTTP verbs as factors in access decisions. |
References Content History Submissions |
---|
Submission Date | Submitter | Organization |
---|
2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | Modifications |
---|
Modification Date | Modifier | Organization |
---|
2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns |
More information is available — Please select a different filter.
|