7. of Elevation of Privilege
An attacker can provide a pointer across a trust boundary, rather than data that can be validated.
Threat |
|
The Log4Shell (https://en.wikipedia.org/wiki/Log4Shell) vulnerability was a classic example of this, where an attacker could pass a reference that pointed back to themselves, which was interpreted by the |
|
CAPEC |
CAPEC-253 – Remote code inclusion |
ASVS |
N/A |
CWE |
CWE-117 – Improper output neutralization for logs CWE-1395 – Dependency on vulnerable third-party component CWE-917 – Improper... |