CAPEC-62: Cross Site Request Forgery

ID CAPEC-62
Typical Severity Very High
Likelihood Of Attack High
Status Draft

An attacker crafts malicious web links and distributes them (via web pages, email, etc.), typically in a targeted manner, hoping to induce users to click on the link and execute the malicious action against some third-party application. If successful, the action embedded in the malicious link will be processed and accepted by the targeted application with the users' privilege level. This type of attack leverages the persistence and implicit trust placed in user session cookies by many web applications today. In such an architecture, once the user authenticates to an application and a session cookie is created on the user's system, all following transactions for that session are authenticated using that cookie including potential actions initiated by an attacker and simply "riding" the existing session cookie.

https://capec.mitre.org/data/definitions/62.html

Weaknesses

# ID Name Type
CWE-306 Missing Authentication for Critical Function weakness
CWE-352 Cross-Site Request Forgery (CSRF) weakness
CWE-664 Improper Control of a Resource Through its Lifetime weakness
CWE-732 Incorrect Permission Assignment for Critical Resource weakness
CWE-1275 Sensitive Cookie with Improper SameSite Attribute weakness

Taxonomiy Mapping

Type # ID Name
WASC 09 Cross-Site Request Forgery
OWASP Attacks Cross Site Request Forgery (CSRF)
Loading...