CAPEC 154 Resource Location Spoofing

Stable Meta Medium Risk
Severity Medium

Description

An adversary deceives an application or user and convinces them to request a resource from an unintended location. By spoofing the location, the adversary can cause an alternate resource to be used, often one that the adversary controls and can be used to help them achieve their malicious goals.

Mitigations

1

Consequences

Relationships

Resources Required

1