CAPEC-596

TCP RST Injection
Draft
2017-01-03
00h00 +00:00
2019-04-04
00h00 +00:00
Alerte pour un CAPEC
Restez informé de toutes modifications pour un CAPEC spécifique.
Gestion des notifications

Descriptions du CAPEC

An adversary injects one or more TCP RST packets to a target after the target has made a HTTP GET request. The goal of this attack is to have the target and/or destination web server terminate the TCP connection.

Informations du CAPEC

Conditions préalables

An On/In Path Device

Faiblesses connexes

CWE-ID Nom de la faiblesse

CWE-940

Improper Verification of Source of a Communication Channel
The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin.

Références

REF-477

Inferring Mechanics of Web Censorship Around the World
John-Paul Verkamp, Minaxi Gupta.

Soumission

Nom Organisation Date Date de publication
Seamus Tuohy 2017-01-03 +00:00

Modifications

Nom Organisation Date Commentaire
CAPEC Content Team The MITRE Corporation 2019-04-04 +00:00 Updated Related_Weaknesses