CAPEC-209: XSS Using MIME Type Mismatch

ID CAPEC-209
Typical Severity Medium
Status Draft

An adversary creates a file with scripting content but where the specified MIME type of the file is such that scripting is not expected. The adversary tricks the victim into accessing a URL that responds with the script file. Some browsers will detect that the specified MIME type of the file does not match the actual type of its content and will automatically switch to using an interpreter for the real content type. If the browser does not invoke script filters before doing this, the adversary's script may run on the target unsanitized, possibly revealing the victim's cookies or executing arbitrary script in their browser.

https://capec.mitre.org/data/definitions/209.html

Weaknesses

# ID Name Type
CWE-20 Improper Input Validation weakness
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') weakness
CWE-646 Reliance on File Name or Extension of Externally-Supplied File weakness
Loading...