Home > CAPEC List > CAPEC-274: HTTP Verb Tampering (Version 2.11)  

CAPEC-274: HTTP Verb Tampering

HTTP Verb Tampering
Definition in a New Window Definition in a New Window
Attack Pattern ID: 274
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

An attacker modifies the HTTP Verb (e.g. GET, PUT, TRACE, etc.) in order to bypass access restrictions. Some web environments allow administrators to restrict access based on the HTTP Verb used with requests. However, attackers can often provide a different HTTP Verb, or even provide a random string as a verb in order to bypass these protections. This allows the attacker to access data that should otherwise be protected.

+ Attack Prerequisites
  • The targeted system must attempt to filter access based on the HTTP verb used in requests.

+ Typical Severity


+ Resources Required

The attacker requires a tool that allows them to manually control the HTTP verb used to send messages to the targeted server.

+ Solutions and Mitigations

Design: Ensure that only legitimate HTTP verbs are allowed.

Design: Do not use HTTP verbs as factors in access decisions.

+ References
[R.274.1] Arshan Dabirsiaghi. "Bypassing Web Authentication and Authorization with HTTP Verb Tampering: How to inadvertently allow attackers full access to your web application". Aspect Security. <http://mirror.transact.net.au/sourceforge/w/project/wa/waspap/waspap/Core/Bypassing_VBAAC_with_HTTP_Verb_Tampering.pdf>.
+ Content History
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017