[Survey the target] An adversary determines the input data stream that is being processed by a data parser that supports using substituion on the victim's side.
[Craft malicious payload] The adversary crafts malicious message containing nested quadratic expansion that completely uses up available server resource.
[Send the message] Send the malicious crafted message to the target URL.
Nom de la faiblesse | |
---|---|
CWE-770 |
Allocation of Resources Without Limits or Throttling The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated. |
Nom | Organisation | Date | Date de publication |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Nom | Organisation | Date | Commentaire |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Mitigations | |
CAPEC Content Team | The MITRE Corporation | Updated Mitigations, Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated @Name, Alternate_Terms, Consequences, Description, Example_Instances, Execution_Flow, Mitigations, Prerequisites | |
CAPEC Content Team | The MITRE Corporation | Updated Example_Instances |