Capec的新手?Start Here
Home>CAPEC List> CAPEC-212: Functionality Misuse (Version 3.9)

CAPEC-212:功能滥用

攻击模式ID:212
Abstraction:Meta
View customized information:
+Description
An adversary leverages a legitimate capability of an application in such a way as to achieve a negative technical impact. The system functionality is not altered or modified but used in a way that was not intended. This is often accomplished through the overuse of a specific functionality or by leveraging functionality with design flaws that enables the adversary to gain access to unauthorized, sensitive data.
+Likelihood Of Attack

Medium

+Typical Severity

Medium

+Relationships
Section Help该表显示了与此攻击模式相关的其他攻击模式和高级类别。这些关系定义为childof和parentof,并深入了解可能存在于较高和较低抽象水平的类似项目。此外,定义了诸如Canfollow,Peerof和Canalsobe之类的关系,以显示用户可能想要探索的类似攻击模式。
Nature Type ID Name
ParentOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 2 Inducing Account Lockout
ParentOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 48 Passing Local Filenames to Functions That Expect a URL
ParentOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 50 Password Recovery Exploitation
ParentOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 111 JSON Hijacking (aka JavaScript Hijacking)
ParentOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 620 Drop Encryption Level
ParentOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 682 Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
PeerOf Standard Attack PatternStandard Attack Pattern - A standard level attack pattern in CAPEC is focused on a specific methodology or technique used in an attack. It is often seen as a singular piece of a fully executed attack. A standard attack pattern is meant to provide sufficient details to understand the specific technique and how it attempts to accomplish a desired goal. A standard level attack pattern is a specific type of a more abstract meta level attack pattern. 663 Exploitation of Transient Instruction Execution
Section HelpThis table shows the views that this attack pattern belongs to and top level categories within that view.
+Prerequisites
The adversary has the capability to interact with the application directly.The target system does not adequately implement safeguards to prevent misuse of authorized actions/processes.
+Skills Required
[Level: Low]
General computer knowledge about how applications are launched, how they interact with input/output, and how they are configured.
+Consequences
Section Help该表指定与攻击模式相关的不同个人后果。该范围确定了违反的安全财产,而影响描述了如果对手在攻击中成功,就会产生负面的技术影响。其可能性提供了有关预期相对于列表中其他后果的特定后果的可能性的信息。例如,可能会有很高的可能性将模式用于实现一定的影响,但是将其利用以实现不同影响的可能性很小。
范围 Impact Likelihood
保密
Gain Privileges
保密
正直
Availability
Other
+缓解
Perform comprehensive threat modeling, a process of identifying, evaluating, and mitigating potential threats to the application. This effort can help reveal potentially obscure application functionality that can be manipulated for malicious purposes.
When implementing security features, consider how they can be misused and compromised.
+Content History
Submissions
Submission Date Submitter Organization
2014-06-23
(版本2.6)
CAPEC Content Team manbetx客户端首页
Modifications
Modification Date Modifier Organization
2015-12-07
(Version 2.8)
CAPEC Content Team manbetx客户端首页
Updated Description Summary, Typical_Likelihood_of_Exploit, Typical_Severity
2017-05-01
(Version 2.10)
CAPEC Content Team manbetx客户端首页
Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Solutions_and_Mitigations
2018-07-31
(Version 2.12)
CAPEC Content Team manbetx客户端首页
Updated Attacker_Skills_or_Knowledge_Required
2020-07-30
(Version 3.3)
CAPEC Content Team manbetx客户端首页
Updated Related_Weaknesses
2021-06-24
(Version 3.5)
CAPEC Content Team manbetx客户端首页
Updated Related_Weaknesses
More information is available — Please select a different filter.
页面最后更新或审查:October 21, 2021