CAPEC 77 Manipulating User-Controlled Variables

Draft Standard High Risk
Severity Very High

Description

This attack targets user controlled variables (DEBUG=1, PHP Globals, and So Forth). An adversary can override variables leveraging user-supplied, untrusted query variables directly used on the application server without any data sanitization. In extreme cases, the adversary can change variables controlling the business logic of the application. For instance, in languages like PHP, a number of poorly set default configurations may allow the user to override variables.

Attack Execution Flow

3

Mitigations

5

Consequences

Indicators

1

Relationships