CAPEC-51: Poison Web Service Registry

ID CAPEC-51
Typical Severity Very High
Likelihood Of Attack High
Status Draft

SOA and Web Services often use a registry to perform look up, get schema information, and metadata about services. A poisoned registry can redirect (think phishing for servers) the service requester to a malicious service provider, provide incorrect information in schema or metadata, and delete information about service provider interfaces.

WS-Addressing is used to virtualize services, provide return addresses and other routing information, however, unless the WS-Addressing headers are protected they are vulnerable to rewriting. Content in a registry is deployed by the service provider. The registry in an SOA or Web Services system can be accessed by the service requester via UDDI or other protocol.

https://capec.mitre.org/data/definitions/51.html

Weaknesses

# ID Name Type
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') weakness
CWE-285 Improper Authorization weakness
CWE-693 Protection Mechanism Failure weakness
Loading...