Prerrequisitos
The attacker needs to be able to identify HTTP Get URLs. The Get methods must be set to call applications that perform operations other than get such as update and delete.
Habilidades requeridas
It is relatively straightforward to identify an HTTP Get method that changes state on the server side and executes against an over-privileged system interface
Mitigaciones
Design: Enforce principle of least privilege
Implementation: Ensure that HTTP Get methods only retrieve state and do not alter state on the server side
Implementation: Ensure that HTTP methods have proper ACLs based on what the functionality they expose
Debilidades relacionadas
| CWE-ID |
Nombre de la debilidad |
|
Privilege Defined With Unsafe Actions A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity. |
|
Improper Privilege Management The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Referencias
REF-463
Security for REST Web Services
Mark O'Neill.
http://www.vordel.com/downloads/rsa_conf_2006.pdf
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CAPEC Content Team |
The MITRE Corporation |
2015-12-07 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2021-06-24 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Description, Extended_Description |