8. of Tampering
An attacker can manipulate data because there’s no integrity protection for data on the network:
Threat |
|
You’re sending payloads to your API in clear text and aren’t signing them, so an attacker can intercept the request and change the content without being traced. |
|
CAPEC |
CAPEC-94: Adversary in the Middle (AiTM) CAPEC-384: Application API Message Manipulation via Man-in-the-Middle (MiTM) |
ASVS |
1.9.1: Ensure you’re using TLS everywhere 13.2.6: Ensure the integrity of headers and payloads |
CWE |
CWE-311: Missing Encryption of Sensitive Data CWE-353: Missing Support for Integrity Check CWE-347: Improper Verification of Cryptographic Signature CWE-471... |