8. of Repudiation
An attacker can make the logs lose or confuse security information.
Threat |
|
You are not sanitizing untrusted data going into the logs. An attacker might perform a log injection of newline characters to be able to complete a log line, thus making it look as though they performed some innocuous tasks while writing fake log lines afterward that contain the actual task performed. This action makes it appear that someone else is responsible. |
|
CAPEC |
CAPEC-93 - Log Injection-Tampering-Forging CAPEC-268 - Audit Log Manipulation CAPEC-81 - Web Server Logs Tampering |
ASVS |
5.3 - Ensure output is encoded and you’re protecting against injection attacks. 7.3.4 - Ensure clocks are synched with an atomic clock and are in the correct time... |