CAPEC-274 HTTP Verb Tampering

CAPEC ID: 274

CAPEC-274 Metadata

Likelihood of Attack

Medium

Typical Severity

Medium

Overview

Summary

An attacker modifies the HTTP Verb (e.g. GET, PUT, TRACE, etc.) in order to bypass access restrictions. Some web environments allow administrators to restrict access based on the HTTP Verb used with requests. However, attackers can often provide a different HTTP Verb, or even provide a random string as a verb in order to bypass these protections. This allows the attacker to access data that should otherwise be protected.

Prerequisites

The targeted system must attempt to filter access based on the HTTP verb used in requests.

Potential Solutions / Mitigations

Design: Ensure that only legitimate HTTP verbs are allowed. Design: Do not use HTTP verbs as factors in access decisions.

Related Weaknesses (CWE)

CWE ID Description
CWE-302 Authentication Bypass by Assumed-Immutable Data
CWE-654 Reliance on a Single Factor in a Security Decision

Related CAPECs

CAPEC ID Description
CAPEC-220 An adversary takes advantage of weaknesses in the protocol by which a client and server are communicating to perform unexpected actions. Communication protocols are necessary to transfer messages between client and server applications. Moreover, different protocols may be used for different types of interactions.

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.