Wymagania wstępne
The target application must leverage an open communications channel.
The channel on which the target communicates must be vulnerable to interception (e.g., adversary in the middle attack - CAPEC-94).
Wymagane zasoby
A tool, such as a MITM Proxy, that is capable of generating and injecting custom inputs to be used in the attack.
Powiązane słabości
| CWE-ID |
Nazwa słabości |
|
Improper Verification of Source of a Communication Channel The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin. |
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
| Seamus Tuohy |
|
2017-01-03 +00:00 |
|
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CAPEC Content Team |
The MITRE Corporation |
2017-05-01 +00:00 |
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Resources_Required |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2021-06-24 +00:00 |
Updated Prerequisites |