Dark Mode

Settings

Capec-267 Detail

Leverage Alternate Encoding

Standard Software Likelihood: High Typical Severity: High

Parents: 153

Children: 3 4 43 52 53 64 71 72 78 79 80 120

Threats: T62 T290 T291

Description

An adversary leverages the possibility to encode potentially harmful input or content used by applications such that the applications are ineffective at validating this encoding standard.

Not present

External ID Source Link Description
CAPEC-267 capec https://capec.mitre.org/data/definitions/267.html
CWE-173 cwe http://cwe.mitre.org/data/definitions/173.html
CWE-172 cwe http://cwe.mitre.org/data/definitions/172.html
CWE-180 cwe http://cwe.mitre.org/data/definitions/180.html
CWE-181 cwe http://cwe.mitre.org/data/definitions/181.html
CWE-73 cwe http://cwe.mitre.org/data/definitions/73.html
CWE-74 cwe http://cwe.mitre.org/data/definitions/74.html
CWE-20 cwe http://cwe.mitre.org/data/definitions/20.html
CWE-697 cwe http://cwe.mitre.org/data/definitions/697.html
CWE-692 cwe http://cwe.mitre.org/data/definitions/692.html
T1027 ATTACK https://attack.mitre.org/wiki/Technique/T1027 Obfuscated Files or Information
REF-108 reference_from_CAPEC http://projects.webappsec.org/Improper-Input-Handling WASC Threat Classification 2.0, 2010, The Web Application Security Consortium (WASC)
REF-109 reference_from_CAPEC http://www.owasp.org/index.php/Category:Encoding OWASP, The Open Web Application Security Project (OWASP)
REF-110 reference_from_CAPEC https://owasp.org/www-project-proactive-controls/v3/en/c4-encode-escape-data OWASP, The Open Web Application Security Project (OWASP)
REF-69 reference_from_CAPEC https://www.owasp.org/www-community/xss-filter-evasion-cheatsheet OWASP Cheatsheets, The Open Web Application Security Project (OWASP)
REF-112 reference_from_CAPEC http://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/character-encoding.html David Wheeler, Secure Programming for Linux and Unix HOWTO
REF-113 reference_from_CAPEC http://en.wikipedia.org/wiki/Character_encoding Wikipedia, The Wikimedia Foundation, Inc
REF-114 reference_from_CAPEC http://www.securityfocus.com/infocus/1232 Eric Hacker, IDS Evasion with Unicode, 2001--01---03
Explore
  1. Survey the application for user-controllable inputs: Using a browser, an automated tool or by inspecting the application, an adversary records all entry points to the application.

  2. Techniques
    Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make special note of any links that include parameters in the URL.
    Use a proxy tool to record all user input entry points visited during a manual traversal of the web application.
    Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery.
    Manually inspect the application to find entry points.
Experiment
  1. Probe entry points to locate vulnerabilities: The adversary uses the entry points gathered in the "Explore" phase as a target list and injects various payloads using a variety of different types of encodings to determine if an entry point actually represents a vulnerability with insufficient validation logic and to characterize the extent to which the vulnerability can be exploited.

  2. Techniques
    Try to use different encodings of content in order to bypass validation routines.
  1. The application's decoder accepts and interprets encoded characters. Data canonicalization, input filtering and validating is not done properly leaving the door open to harmful characters for the target host.

Not present

Low Medium
An adversary can inject different representation of a filtered character in a different encoding.
An adversary may craft subtle encoding of input data by using the knowledge that they have gathered about the target host.
Integrity Availability Authorization Access Control Accountability Authentication Confidentiality Non-Repudiation
Modify Data Unreliable Execution (Denial of Service) Execute Unauthorized Commands (Run Arbitrary Code) Bypass Protection Mechanism Gain Privileges Gain Privileges Read Data Gain Privileges
Resource Consumption (Denial of Service) Gain Privileges
Bypass Protection Mechanism
  1. Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, and 7 does not properly handle unspecified "encoding strings," which allows remote adversaries to bypass the Same Origin Policy and obtain sensitive information via a crafted web site, aka "Post Encoding Information Disclosure Vulnerability." Related Vulnerabilities CVE-2010-0488
  2. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses.