CAPEC-85: AJAX Footprinting
ID
CAPEC-85
Typical Severity
Low
Likelihood Of Attack
High
Status
Draft
This attack utilizes the frequent client-server roundtrips in Ajax conversation to scan a system. While Ajax does not open up new vulnerabilities per se, it does optimize them from an attacker point of view. A common first step for an attacker is to footprint the target environment to understand what attacks will work. Since footprinting relies on enumeration, the conversational pattern of rapid, multiple requests and responses that are typical in Ajax applications enable an attacker to look for many vulnerabilities, well-known ports, network locations and so on. The knowledge gained through Ajax fingerprinting can be used to support other attacks, such as XSS.
Weaknesses
# ID | Name | Type |
---|---|---|
CWE-20 | Improper Input Validation | weakness |
CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | weakness |
CWE-86 | Improper Neutralization of Invalid Characters in Identifiers in Web Pages | weakness |
CWE-96 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') | weakness |
CWE-113 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | weakness |
CWE-116 | Improper Encoding or Escaping of Output | weakness |
CWE-184 | Incomplete List of Disallowed Inputs | weakness |
CWE-348 | Use of Less Trusted Source | weakness |
CWE-692 | Incomplete Denylist to Cross-Site Scripting | weakness |