CAPEC-472

Browser Fingerprinting
Niski
Draft
2014-06-23
00h00 +00:00
2022-09-29
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.

Informacje CAPEC

Wymagania wstępne

Victim's browser visits a website that contains attacker's Java ScriptJava Script is not disabled in the victim's browser

Łagodzenie

Configuration: Disable Java Script in the browser

Powiązane słabości

CWE-ID Nazwa słabości

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Odniesienia

REF-410

Detecting browsers javascript hacks
Gareth Heyes.
http://www.thespanner.co.uk/2009/01/29/detecting-browsers-javascript-hacks/

Zgłoszenie

Nazwa Organizacja Data Data wydania
CAPEC Content Team The MITRE Corporation 2014-06-23 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Example_Instances