CAPEC-150: Collect Data from Common Resource Locations
Description
Extended Description
Many applications allow users to send email messages by filling in fields. For example, a web site may have a link to "share this site with a friend" where the user provides the recipient's email address and the web application fills out all the other fields, such as the subject and body. In this pattern, an adversary adds header and body information to an email message by injecting additional content in an input field used to construct a header of the mail message. This attack takes advantage of the fact that RFC 822 requires that headers in a mail message be separated by a carriage return. As a result, an adversary can inject new headers or content simply by adding a delimiting carriage return and then supplying the new heading and body information. This attack will not work if the user can only supply the message body since a carriage return in the body is treated as a normal character.
Severity :
Medium
Possibility :
Type :
Standard
Relationships with other CAPECs
This table shows the other attack patterns and high level categories that are related to this attack pattern.
Prerequisites
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- The targeted applications must either expect files to be located at a specific location or, if the location of the files can be configured by the user, the user either failed to move the files from the default location or placed them in a conventional location for files of the given type.
Skills required
This table shows the other attack patterns and high level categories that are related to this attack pattern.
Taxonomy mappings
Resources required
None: No specialized resources are required to execute this type of attack. In some cases, the attacker need not even have direct access to the locations on the target computer where the targeted resources reside.
Related CWE
A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful.
CWE-552: Files or Directories Accessible to External Parties
CWE-1239: Improper Zeroization of Hardware Register
CWE-1258: Exposure of Sensitive System Information Due to Uncleared Debug Information
CWE-1266: Improper Scrubbing of Sensitive Data from Decommissioned Device
CWE-1272: Sensitive Information Uncleared Before Debug/Power State Transition
CWE-1323: Improper Management of Sensitive Trace Data
CWE-1330: Remanent Data Readable after Memory Erase
Visit http://capec.mitre.org/ for more details.