Dark Mode

Settings

Capec-274 Detail

HTTP Verb Tampering

Detailed Software Typical Severity: Medium

Parents: 220

Threats: T294

Description

An attacker modifies the HTTP Verb (e.g. GET, PUT, TRACE, etc.) in order to bypass access restrictions. Some web environments allow administrators to restrict access based on the HTTP Verb used with requests. However, attackers can often provide a different HTTP Verb, or even provide a random string as a verb in order to bypass these protections. This allows the attacker to access data that should otherwise be protected.

Not present

External ID Source Link Description
CAPEC-274 capec https://capec.mitre.org/data/definitions/274.html
CWE-302 cwe http://cwe.mitre.org/data/definitions/302.html
CWE-654 cwe http://cwe.mitre.org/data/definitions/654.html
REF-118 reference_from_CAPEC http://mirror.transact.net.au/sourceforge/w/project/wa/waspap/waspap/Core/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf Arshan Dabirsiaghi, Bypassing Web Authentication and Authorization with HTTP Verb Tampering: How to inadvertently allow attackers full access to your web application, Aspect Security

Not present

  1. The targeted system must attempt to filter access based on the HTTP verb used in requests.
  1. The attacker requires a tool that allows them to manually control the HTTP verb used to send messages to the targeted server.

Not present

Not present

Not present