Jack of Denial of Service II
An attacker can cause the logging subsystem to stop working.
Threat |
|
Your log files are owned by the technical user running the application, so an attacker can take advantage of a remote code execution vulnerability in your system to run code that changes the file permissions on the log files. Now, the application can no longer write logs to the files. |
|
CAPEC |
CAPEC-571 – Block logging to the central repository |
ASVS |
7.3.3 – Ensure privileges are set correctly for log access |
CWE |
CWE-778 – Insufficient logging |
Mitigations |
|
|