CAPEC 54 Query System for Information

Draft Standard High Risk
Severity Low

Description

An adversary, aware of an application's location (and possibly authorized to use the application), probes an application's structure and evaluates its robustness by submitting requests and examining responses. Often, this is accomplished by sending variants of expected queries in the hope that these modified queries might return information beyond what the expected set of queries would provide.

Attack Execution Flow

4

Mitigations

2

Consequences

Indicators

1

Relationships

Resources Required

1