CAPEC-271 Metadata
Likelihood of Attack
Low
Typical Severity
High
Overview
Summary
An adversary corrupts or modifies the content of a schema for the purpose of undermining the security of the target. Schemas provide the structure and content definitions for resources used by an application. By replacing or modifying a schema, the adversary can affect how the application handles or interprets a resource, often leading to possible denial of service, entering into an unexpected state, or recording incomplete data.
Prerequisites
Some level of access to modify the target schema. The schema used by the target application must be improperly secured against unauthorized modification and manipulation.
Execution Flow
Step | Phase | Description | Techniques |
---|---|---|---|
1 | Explore | [Find target application and schema] The adversary first finds the application that they want to target. This application must use schemas in some way, so the adversary also needs to confirm that schemas are being used. |
|
2 | Experiment | [Gain access to schema] The adversary gains access to the schema so that they can modify the contents. |
|
3 | Exploit | [Poison schema] Once the adversary gains access to the schema, they will alter it to achieve a desired effect. Locally, they can just modify the file. For remote schemas, the adversary will alter the schema in transit by performing an adversary in the middle attack. |
|
Potential Solutions / Mitigations
Design: Protect the schema against unauthorized modification. Implementation: For applications that use a known schema, use a local copy or a known good repository instead of the schema reference supplied in the schema document. Implementation: For applications that leverage remote schemas, use the HTTPS protocol to prevent modification of traffic in transit and to avoid unauthorized modification.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-15 | External Control of System or Configuration Setting |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-94 | An adversary targets the communication between two components (typically client and server), in order to alter or obtain data from transactions. A general approach entails the adversary placing themself within the communication channel between the two components. |
CAPEC-176 | An attacker manipulates files or settings external to a target application which affect the behavior of that application. For example, many applications use external configuration files and libraries - modification of these entities or otherwise affecting the application's ability to use them would constitute a configuration/environment manipulation attack. |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.