Skip to content

Document attacks based on poorly secured discovery mechanism #12

@elf-pavlik

Description

@elf-pavlik

This is related to #9
An example scenario:

  1. User authenticates with a compromised application
  2. The application is allowed to make modifications to the discovery mechanism
  3. Compromised application inject location controlled by the attacker for financial records into the discovery mechanisme
  4. Now other applications storing financial records will store it in the location controlled by the attacker

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions