[Spider] Using an automated tool, an attacker follows all public links on a web site. They record all the links they find.
[Attempt well-known or guessable resource locations] Using an automated tool, an attacker requests a variety of well-known URLs that correspond to administrative, debugging, or other useful internal actions. They record all the positive responses from the server.
[Use unauthorized resources] By visiting the unprotected resource, the attacker makes use of unauthorized functionality.
[View unauthorized data] The attacker discovers and views unprotected sensitive data.
Weakness Name | |
---|---|
CWE-425 |
Direct Request ('Forced Browsing') The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files. |
CWE-285 |
Improper Authorization The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
CWE-693 |
Protection Mechanism Failure The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns | |
CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns, Resources_Required | |
CAPEC Content Team | The MITRE Corporation | Updated Attack_Phases, Attacker_Skills_or_Knowledge_Required, Typical_Likelihood_of_Exploit | |
CAPEC Content Team | The MITRE Corporation | Updated Example_Instances, Execution_Flow | |
CAPEC Content Team | The MITRE Corporation | Updated Description, Taxonomy_Mappings |