Prerequisites
The target host is logging the action and data of the user.
The target host insufficiently protects access to the logs or logging mechanisms.
Resources Required
Array
Related Weaknesses
| CWE-ID |
Weakness Name |
|
Improper Output Neutralization for Logs The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special elements when the message is written to a log file. |
Submission
| Name |
Organization |
Date |
Date release |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifications
| Name |
Organization |
Date |
Comment |
| CAPEC Content Team |
The MITRE Corporation |
2017-01-09 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Taxonomy_Mappings |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Related_Attack_Patterns, Taxonomy_Mappings |