Scope | Impact | Likelihood |
---|---|---|
Access Control Other | Gain Privileges or Assume Identity, Varies by Context Note: An attacker can access any functionality that is inadvertently accessible to the source. |
References | Description |
---|---|
CVE-2000-1218 | DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning |
CVE-2005-0877 | DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning |
CVE-2001-1452 | DNS server caches glue records received from non-delegated name servers |
Use a mechanism that can validate the identity of the source, such as a certificate, and validate the integrity of data to ensure that it cannot be modified in transit using an Adversary-in-the-Middle (AITM) attack.
When designing functionality of actions in the URL scheme, consider whether the action should be accessible to all mobile applications, or if an allowlist of applications to interface with is appropriate.
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-500 | WebView Injection An adversary, through a previously installed malicious application, injects code into the context of a web page displayed by a WebView component. Through the injected code, an adversary is able to manipulate the DOM tree and cookies of the page, expose sensitive information, and can launch attacks against the web application from within the web page. |
CAPEC-594 | Traffic Injection An adversary injects traffic into the target's network connection. The adversary is therefore able to degrade or disrupt the connection, and potentially modify the content. This is not a flooding attack, as the adversary is not focusing on exhausting resources. Instead, the adversary is crafting a specific input to affect the system in a particular way. |
CAPEC-595 | Connection Reset In this attack pattern, an adversary injects a connection reset packet to one or both ends of a target's connection. The attacker is therefore able to have the target and/or the destination server sever the connection without having to directly filter the traffic between them. |
CAPEC-596 | TCP RST Injection An adversary injects one or more TCP RST packets to a target after the target has made a HTTP GET request. The goal of this attack is to have the target and/or destination web server terminate the TCP connection. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 2.6 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Modes_of_Introduction, References, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Applicable_Platforms, Potential_Mitigations, Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples, Potential_Mitigations | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description, Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes, Relationships | |
CWE Content Team | MITRE | updated References |