CAPEC 271 Schema Poisoning

Draft Standard Low Risk
Severity High

Description

An adversary corrupts or modifies the content of a schema for the purpose of undermining the security of the target. Schemas provide the structure and content definitions for resources used by an application. By replacing or modifying a schema, the adversary can affect how the application handles or interprets a resource, often leading to possible denial of service, entering into an unexpected state, or recording incomplete data.

Attack Execution Flow

3

Mitigations

3

Consequences

Relationships

Resources Required

1