Ace of Tampering I
You’ve invented a new tampering attack:
Threat |
|
You’re using deny listing to restrict data that will be processed by your application or avoid injection attacks and an attacker uses an alternate encoding to bypass your validation because they haven’t thought of this edge case. |
|
CAPEC |
CAPEC-267: Leverage Alternate Encoding |
ASVS |
5.1.4: Ensure a schema is used when validating XML and JSON data. |
CWE |
CWE-791: Incomplete Filtering of Special Elements |
Mitigations |
|
|