7. of Repudiation
An attacker can make the logs wrap around and lose data.
Threat |
|
Your log appender may be set to overwrite when the log gets too large, and the attacker is forcing your application to generate too much log data deliberately. |
|
CAPEC |
CAPEC-268 - Audit Log Manipulation CAPEC-81 - Web Server Logs Tampering |
ASVS |
N/A |
CWE |
CWE-222 - Truncation of Security-Relevant Information |
Mitigations |
|
|