[Survey the target] An adversary determines the input data stream that is being processed by a data parser that supports using substituion on the victim's side.
[Craft malicious payload] The adversary crafts malicious message containing nested quadratic expansion that completely uses up available server resource.
[Send the message] Send the malicious crafted message to the target URL.
Weakness Name | |
---|---|
CWE-770 |
Allocation of Resources Without Limits or Throttling The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Mitigations | |
CAPEC Content Team | The MITRE Corporation | Updated Mitigations, Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated @Name, Alternate_Terms, Consequences, Description, Example_Instances, Execution_Flow, Mitigations, Prerequisites | |
CAPEC Content Team | The MITRE Corporation | Updated Example_Instances |