CAPEC-107: Cross Site Tracing

ID CAPEC-107
Typical Severity Very High
Likelihood Of Attack Medium
Status Draft

Cross Site Tracing (XST) enables an adversary to steal the victim's session cookie and possibly other authentication credentials transmitted in the header of the HTTP request when the victim's browser communicates to a destination system's web server.

The adversary uses an XSS attack to have victim's browser sent an HTTP TRACE request to a destination web server, which will proceed to return a response to the victim's web browser that contains the original HTTP request in its body. Since the HTTP header of the original HTTP TRACE request had the victim's session cookie in it, that session cookie can now be picked off the HTTP TRACE response and sent to the adversary's malicious site. XST becomes relevant when direct access to the session cookie via the "document.cookie" object is disabled with the use of httpOnly attribute which ensures that the cookie can be transmitted in HTTP requests but cannot be accessed in other ways. Using SSL does not protect against XST. If the system with which the victim is interacting is susceptible to XSS, an adversary can exploit that weakness directly to get their malicious script to issue an HTTP TRACE request to the destination system's web server.

https://capec.mitre.org/data/definitions/107.html

Weaknesses

# ID Name Type
CWE-648 Incorrect Use of Privileged APIs weakness
CWE-693 Protection Mechanism Failure weakness

Taxonomiy Mapping

Type # ID Name
OWASP Attacks Cross Site Tracing
Loading...