CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters
Description
Extended Description
Due to the different responses from open and closed ports, SYN packets can be used to determine the remote state of the port. A TCP SYN ping is also useful for discovering alive hosts protected by a stateful firewall. In cases where a specific firewall rule does not block access to a port, a SYN packet can pass through the firewall to the host and solicit a response from either an open or closed port. When a stateful firewall is present, SYN pings are preferable to ACK pings because a stateful firewall will typically drop all unsolicited ACK packets as they are not part of an existing or new connection. TCP SYN pings often fail when a stateless ACL or firewall is configured to blanket-filter incoming packets to a port. The firewall device will discard any SYN packets to a blocked port. Often, an adversary will alternate between SYN and ACK pings to discover if a host is alive.
Severity :
Medium
Possibility :
Medium
Type :
Detailed
Relationships with other CAPECs
This table shows the other attack patterns and high level categories that are related to this attack pattern.
Prerequisites
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- The targeted API must ignore the leading ghost characters that are used to get past the filters for the semantics to be the same.
Skills required
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- Medium The ability to make an API request, and knowledge of "ghost" characters that will not be filtered by any input validation. These "ghost" characters must be known to not affect the way in which the request will be interpreted.
Taxonomy mappings
Mappings to ATT&CK, OWASP and other frameworks.
Related CWE
A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful.
CWE-20: Improper Input Validation
CWE-41: Improper Resolution of Path Equivalence
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE-172: Encoding Error
CWE-173: Improper Handling of Alternate Encoding
CWE-179: Incorrect Behavior Order: Early Validation
CWE-180: Incorrect Behavior Order: Validate Before Canonicalize
CWE-181: Incorrect Behavior Order: Validate Before Filter
CWE-183: Permissive List of Allowed Inputs
CWE-184: Incomplete List of Disallowed Inputs
CWE-697: Incorrect Comparison
CWE-707: Improper Neutralization
Visit http://capec.mitre.org/ for more details.