HTTP Verb Tampering
Attack Pattern ID: 274 (Detailed Attack Pattern Completeness: Stub)Typical Severity: MediumStatus: Draft
+ Description

Summary

An attacker modifies the HTTP Verb (e.g. GET, PUT, TRACE, etc.) in order to bypass access restrictions. Some web environments allow administrators to restrict access based on the HTTP Verb used with requests. However, attackers can often provide a different HTTP Verb, or even provide a random string as a verb in order to bypass these protections. This allows the attacker to access data that should otherwise be protected.

+ Attack Prerequisites

The targeted system must attempt to filter access based on the HTTP verb used in requests.

+ Resources Required

The attacker requires a tool that allows them to manually control the HTTP verb used to sent messages to the targeted server.

+ Solutions and Mitigations

Design: Ensure that only legitimate HTTP verbs are allowed.

Design: Do not use HTTP verbs as factors in access decisions.

+ Related Weaknesses
CWE-IDWeakness NameWeakness Relationship Type
302Authentication Bypass by Assumed-Immutable DataTargeted
654Reliance on a Single Factor in a Security DecisionSecondary
+ Related Attack Patterns
NatureTypeIDNameDescriptionView(s) this relationship pertains toView\(s\)
ChildOfAttack PatternAttack Pattern220Client-Server Protocol Manipulation 
Mechanism of Attack (primary)1000