[Determine parameters] Determine all user-controllable parameters of the application either by probing or by finding documentation
[Cause error condition] Inject each parameter with content that causes an error condition to manifest
[Modify parameters] Modify the content of each parameter according to observed error conditions
[Follow up attack] Once the above steps have been repeated with enough parameters, the application will be sufficiently mapped out. The adversary can then launch a desired attack (for example, Blind SQL Injection)
The Attacker needs the ability to probe application functionality and provide it erroneous directives or data without triggering intrusion detection schemes or making enough of an impact on application logging that steps are taken against the adversary.
The Attack does not need special hardware, software, skills, or access.
Weakness Name | |
---|---|
CWE-209 |
Generation of Error Message Containing Sensitive Information The product generates an error message that includes sensitive information about its environment, users, or associated data. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Description Summary | |
CAPEC Content Team | The MITRE Corporation | Updated References | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Weaknesses | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated Execution_Flow, Resources_Required | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns |