CAPEC 460 HTTP Parameter Pollution (HPP)

Draft Detailed Unknown Risk
Severity Medium

Description

An adversary adds duplicate HTTP GET/POST parameters by injecting query string delimiters. Via HPP it may be possible to override existing hardcoded HTTP parameters, modify the application behaviors, access and, potentially exploit, uncontrollable variables, and bypass input validation checkpoints and WAF rules.

Attack Execution Flow

3

Mitigations

4

Consequences

Relationships

Resources Required

1