CAPEC-274: HTTP Verb Tampering
Detailed
Draft
严重程度: Medium
CAPEC版本: 3.9
更新日期: 2023-01-24
攻击模式描述
An attacker modifies the HTTP Verb (e.g. GET, PUT, TRACE, etc.) in order to bypass access restrictions. Some web environments allow administrators to restrict access based on the HTTP Verb used with requests. However, attackers can often provide a different HTTP Verb, or even provide a random string as a verb in order to bypass these protections. This allows the attacker to access data that should otherwise be protected.
前提条件
- The targeted system must attempt to filter access based on the HTTP verb used in requests.
所需资源
- The attacker requires a tool that allows them to manually control the HTTP verb used to send messages to the targeted server.
缓解措施
Design: Ensure that only legitimate HTTP verbs are allowed.
Design: Do not use HTTP verbs as factors in access decisions.