CAPEC-200 Removal of filters: Input filters, output filters, data masking

CAPEC ID: 200

CAPEC-200 Metadata

Likelihood of Attack

Low

Typical Severity

Medium

Overview

Summary

An attacker removes or disables filtering mechanisms on the target application. Input filters prevent invalid data from being sent to an application (for example, overly large inputs that might cause a buffer overflow or other malformed inputs that may not be correctly handled by an application). Input filters might also be designed to constrained executable content.

Prerequisites

The target application must utilize some sort of filtering mechanism (input, output, or data masking).

Potential Solutions / Mitigations

No specific solutions listed.

Related CAPECs

CAPEC ID Description
CAPEC-207 An adversary removes or disables functionality on the client that the server assumes to be present and trustworthy.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.