10. of Repudiation
An attacker can get arbitrary data into logs from unauthenticated (or weak authenticated) outsiders without validation.
Threat |
|
You’ve centralized your logging, but the loggers aren’t authenticated with the central system, so anyone could fake the logs for some part of the system. |
|
CAPEC |
CAPEC-194 - Fake the Source of Data CAPEC-115 - Authentication Bypass CAPEC-22 - Exploiting Trust in Client |
ASVS |
1.2.2 - Ensure access to the Data layer is authenticated and the principle of least privilege is being used. 7.3.3 - Ensure logs are protected by strict access controls and that the entries are immutable. |
CWE |
CWE-921 - Storage of Sensitive Data in a Mechanism without Access... |