CAPEC-141: Cache Poisoning

Standard Draft 严重程度: High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An attacker exploits the functionality of cache technologies to cause specific data to be cached that aids the attackers' objectives. This describes any attack whereby an attacker places incorrect or harmful material in cache. The targeted cache can be an application's cache (e.g. a web browser cache) or a public cache (e.g. a DNS or ARP cache). Until the cache is refreshed, most applications or clients will treat the corrupted cache value as valid. This can lead to a wide range of exploits including redirecting web browsers towards sites that install malware and repeatedly incorrect calculations based on the incorrect value.

执行流程

步骤 1 Explore

[Identify and explore caches] Use tools to sniff traffic and scan a network in order to locate application's cache (e.g. a web browser cache) or a public cache (e.g. a DNS or ARP cache) that may have vulnerabilities. Look for poisoning point in cache table entries.

技术:
  • Run tools that check available entries in the cache.
步骤 2 Experiment

[Cause specific data to be cached] An attacker sends bogus request to the target, and then floods responses that trick a cache to remember malicious responses, which are wrong answers of queries.

技术:
  • Intercept or modify a query, or send a bogus query with known credentials (such as transaction ID).
步骤 3 Exploit

[Redirect users to malicious website] As the attacker succeeds in exploiting the vulnerability, they are able to manipulate and interpose malicious response data to targeted victim queries.

技术:
  • Intercept or modify a query, or send a bogus query with known credentials (such as transaction ID).
  • Adversary-in-the-Middle attacks (CAPEC-94) intercept secure communication between two parties.

前提条件

  • The attacker must be able to modify the value stored in a cache to match a desired value.
  • The targeted application must not be able to detect the illicit modification of the cache and must trust the cache value in its calculations.

所需技能

Medium To overwrite/modify targeted cache

缓解措施

Configuration: Disable client side caching.

Implementation: Listens for query replies on a network, and sends a notification via email when an entry changes.

分类映射

分类名称 条目ID 条目名称
ATTACK 1557.002 Adversary-in-the-Middle: ARP Cache Poisoning
OWASP Attacks - Cache Poisoning
关键信息

CAPEC ID: CAPEC-141

抽象级别: Standard

状态: Draft

典型严重程度: High

攻击可能性: High

相关攻击模式