CAPEC 240 Resource Injection

Stable Meta High Risk
Severity High

Description

An adversary exploits weaknesses in input validation by manipulating resource identifiers enabling the unintended modification or specification of a resource.

Mitigations

3

Consequences

Relationships