{
"id": "bundle--8bd4aa5d-8297-4c2e-9d55-8a812269388d",
"objects": [
{
"created": "2014-06-23T00:00:00.000Z",
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd",
"description": "This attack targets the use of the backslash in alternate encoding. An adversary can provide a backslash as a leading character and causes a parser to believe that the next character is special. This is called an escape. By using that trick, the adversary tries to exploit alternate ways to encode the same character which leads to filter problems and opens avenues to attack.",
"external_references": [
{
"external_id": "CAPEC-78",
"source_name": "capec",
"url": "https://capec.mitre.org/data/definitions/78.html"
},
{
"external_id": "CWE-180",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/180.html"
},
{
"external_id": "CWE-181",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/181.html"
},
{
"external_id": "CWE-173",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/173.html"
},
{
"external_id": "CWE-172",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/172.html"
},
{
"external_id": "CWE-73",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/73.html"
},
{
"external_id": "CWE-22",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/22.html"
},
{
"external_id": "CWE-74",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/74.html"
},
{
"external_id": "CWE-20",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/20.html"
},
{
"external_id": "CWE-697",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/697.html"
},
{
"external_id": "CWE-707",
"source_name": "cwe",
"url": "http://cwe.mitre.org/data/definitions/707.html"
},
{
"description": "G. Hoglund, G. McGraw, Exploiting Software: How to Break Code, 2004--02, Addison-Wesley",
"external_id": "REF-1",
"source_name": "reference_from_CAPEC"
}
],
"id": "attack-pattern--07e5901d-0f6d-41a9-ac19-e00eecece95f",
"modified": "2022-09-29T00:00:00.000Z",
"name": "Using Escaped Slashes in Alternate Encoding",
"object_marking_refs": [
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d"
],
"spec_version": "2.1",
"type": "attack-pattern",
"x_capec_abstraction": "Detailed",
"x_capec_child_of_refs": [
"attack-pattern--a1af7c24-25cb-46e5-a27b-ed316e1f91ce"
],
"x_capec_consequences": {
"Access_Control": [
"Bypass Protection Mechanism"
],
"Authorization": [
"Bypass Protection Mechanism"
],
"Availability": [
"Resource Consumption (Denial of Service)",
"Execute Unauthorized Commands (Run Arbitrary Code)"
],
"Confidentiality": [
"Read Data",
"Execute Unauthorized Commands (Run Arbitrary Code)",
"Bypass Protection Mechanism"
],
"Integrity": [
"Execute Unauthorized Commands (Run Arbitrary Code)"
]
},
"x_capec_domains": [
"Software"
],
"x_capec_example_instances": [
"\n
Survey the application for user-controllable inputs: Using a browser, an automated tool or by inspecting the application, an adversary records all entry points to the application.
Techniques |
---|
Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make special note of any links that include parameters in the URL. |
Use a proxy tool to record all user input entry points visited during a manual traversal of the web application. |
Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery. |
Manually inspect the application to find entry points. |
Probe entry points to locate vulnerabilities: The adversary uses the entry points gathered in the \"Explore\" phase as a target list and attempts to escape multiple different special characters using a backslash.
Techniques |
---|
Escape a special character with a backslash to bypass input validation. |
Try different encodings of both the backslash and the special character to see if this bypasses input validation |
Manipulate input: Once the adversary determines how to bypass filters that filter out special characters using an escaped slash, they will manipulate the user input in a way that is not intended by the application.