{ "id": "bundle--90216c3a-8ce9-4fad-b81c-4f7714af9d48", "objects": [ { "created": "2014-06-23T00:00:00.000Z", "created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", "description": "An adversary distributes a link (or possibly some other query structure) with a request to a third party web server that is malformed and also contains a block of exploit code in order to have the exploit become live code in the resulting error page.", "external_references": [ { "external_id": "CAPEC-198", "source_name": "capec", "url": "https://capec.mitre.org/data/definitions/198.html" }, { "external_id": "CWE-81", "source_name": "cwe", "url": "http://cwe.mitre.org/data/definitions/81.html" } ], "id": "attack-pattern--0e2bf24b-2931-45aa-a0e9-22eccfb310b2", "modified": "2022-09-29T00:00:00.000Z", "name": "XSS Targeting Error Pages", "object_marking_refs": [ "marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" ], "spec_version": "2.1", "type": "attack-pattern", "x_capec_abstraction": "Detailed", "x_capec_child_of_refs": [ "attack-pattern--61b17787-fe92-427c-9e6a-6311997d7b2a", "attack-pattern--800f8095-99b6-4bb9-8bc6-8b9727201a2f", "attack-pattern--b1eef783-daae-494c-a418-cd9ada7cbe8b" ], "x_capec_domains": [ "Software", "Software", "Software" ], "x_capec_execution_flow": "
Survey the application for user-controllable inputs as URL parameters: Using a browser or an automated tool, an adversary follows all public links and actions on a web site. They record all the links, the forms, the resources accessed and all other potential entry-points for the web application, looking for URLs which use parameters.
Techniques |
---|
Use a spidering tool to follow and record all links and analyze the web pages to find entry points. Make note of any links that include parameters in the URL. |
Use a proxy tool to record all links visited during a manual traversal of the web application. |
Use a browser to manually explore the website and analyze how it is constructed. Many browsers' plugins are available to facilitate the analysis or automate the discovery. |
Cause application to return error page: The adversary uses the URLs gathered in the \"Explore\" phase as a target list and injects various common script payloads and special characters into the parameters to see if an error page occurs, and if the injected payload is executed by the error page.
Techniques |
---|
Use a list of XSS probe strings to inject script in parameters of known URLs. If possible, the probe strings contain a unique identifier. |
Use a proxy tool to record results of manual input of XSS probes in known URLs. |
Use a list of HTML special characters to inject into parameters of known URLs and check if they caused errors |
Craft malicious XSS URL: Once the adversary has determined which parameters are vulnerable to XSS through an error page, they will craft a malicious URL containing the XSS exploit. The adversary can have many goals, from stealing session IDs, cookies, credentials, and page content from the victim.
Techniques |
---|
Change a URL parameter to include a malicious script tag. |
Send information gathered from the malicious script to a remote endpoint. |
Get victim to click URL: In order for the attack to be successful, the victim needs to access the malicious URL.
Techniques |
---|
Send a phishing email to the victim containing the malicious URL. This can be hidden in a hyperlink as to not show the full URL, which might draw suspicion. |
Put the malicious URL on a public forum, where many victims might accidentally click the link. |