Dark Mode
Capec-240 Detail
Resource Injection
Meta Communications Software Likelihood: High Typical Severity: High
Children: 610
An adversary exploits weaknesses in input validation by manipulating resource identifiers enabling the unintended modification or specification of a resource.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-240 | capec | https://capec.mitre.org/data/definitions/240.html | |
| CWE-99 | cwe | http://cwe.mitre.org/data/definitions/99.html | |
| OWASP Attacks | https://owasp.org/www-community/attacks/Resource_Injection | Resource Injection |
Not present
- The target application allows the user to both specify the identifier used to access a system resource. Through this permission, the user gains the capability to perform actions on that resource (e.g., overwrite the file)
Not present
Not present
| Integrity | Confidentiality |
|---|---|
| Modify Data | Read Data |
Not present