Queen of Tampering
An attacker can change parameters over a trust boundary and after validation (for example, important parameters in a hidden field in HTML, or passing a pointer to critical memory):
Threat |
|
You’re not performing any validation or sanitization on the backend before processing the data. This leaves you open to an attacker using a proxy such as ZAP to capture the request and modify the parameters after any validation and/or sanitization has been performed in the browser, thus bypassing your protective measures. |
|
CAPEC |
CAPEC-74: Manipulating State CAPEC-157: Sniffing Attacks CAPEC-77: Manipulating User-Controlled Variables CAPEC-384: Application API Message Manipulation via Man-in-the-Middle CAPEC-248: Command Injection CAPEC-66: SQL Injection |
... |