test_scratch / cti-ATT-CK-v13.1 /capec /2.1 /attack-pattern /attack-pattern--1809fa36-f249-4e55-80ab-26570fd24cab.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
2.11 kB
{
"id": "bundle--63b6d632-c794-42a7-b46d-dc5a75e7b1ab",
"objects": [
{
"created": "2014-06-23T00:00:00.000Z",
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd",
"description": "Data Interchange Protocols are used to transmit structured data between entities. These protocols are often specific to a particular domain (B2B: purchase orders, invoices, transport logistics and waybills, medical records). They are often, but not always, XML-based. Subverting the protocol can allow an adversary to impersonate others, discover sensitive information, control the outcome of a session, or perform other attacks. This type of attack targets invalid assumptions that may be inherent in implementers of the protocol, incorrect implementations of the protocol, or vulnerabilities in the protocol itself.",
"external_references": [
{
"external_id": "CAPEC-277",
"source_name": "capec",
"url": "https://capec.mitre.org/data/definitions/277.html"
},
{
"external_id": "CWE-707",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/707.html"
}
],
"id": "attack-pattern--1809fa36-f249-4e55-80ab-26570fd24cab",
"modified": "2019-04-04T00:00:00.000Z",
"name": "Data Interchange Protocol Manipulation",
"object_marking_refs": [
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d"
],
"spec_version": "2.1",
"type": "attack-pattern",
"x_capec_abstraction": "Standard",
"x_capec_child_of_refs": [
"attack-pattern--2166d3c5-baec-4f42-8284-c1b5b649ad34"
],
"x_capec_domains": [
"Communications",
"Software"
],
"x_capec_status": "Draft",
"x_capec_version": "3.9"
}
],
"type": "bundle"
}