Threat Modeling Report

Created on 27/11/2024 11:45:13 p. m.

Threat Model Name:

Owner:

Reviewer:

Contributors:

Description:

Assumptions:

External Dependencies:


Threat Model Summary:

Not Started73
Not Applicable0
Needs Investigation0
Mitigation Implemented12
Total85
Total Migrated0


Diagram:

 diagram screenshot

Diagram Summary:

Not Started73
Not Applicable0
Needs Investigation0
Mitigation Implemented12
Total85
Total Migrated0

Threat(s) Not Associated With an Interaction:

1. Spoofing the Agent External Entity  [State: Mitigation Implemented]  [Priority: High] 

Category:Spoofing
Description:Agent may be spoofed by an attacker and this may lead to unauthorized access to Web Server. Consider using a standard authentication mechanism to identify the external entity.
Justification:Mitigacion: Implementar autenticación estándar para validar la identidad del agente externo.

2. Cross Site Scripting  [State: Mitigation Implemented]  [Priority: High] 

Category:Tampering
Description:The web server 'Web Server' could be a subject to a cross-site scripting attack because it does not sanitize untrusted input.
Justification:Mitigacion: Sanitizar todas las entradas de los usuarios para evitar la ejecución de scripts maliciosos.

3. Potential Data Repudiation by Web Server  [State: Mitigation Implemented]  [Priority: High] 

Category:Repudiation
Description:Web Server claims that it did not receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:Mitigacion: Implementar registros de auditoría que registren las solicitudes y respuestas para garantizar la trazabilidad.

4. Potential Process Crash or Stop for Web Server  [State: Mitigation Implemented]  [Priority: High] 

Category:Denial Of Service
Description:Web Server crashes, halts, stops or runs slowly; in all cases violating an availability metric.
Justification:Mitigacion: Implementar mecanismos de prevención de DoS, como filtrado de tráfico y control de acceso.

5. Data Flow Agent->Server Is Potentially Interrupted  [State: Mitigation Implemented]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:Mitigacion: Implementar mecanismos para detectar y mitigar interrupciones en el flujo de datos, como monitoreo de redes y protección contra ataques DoS.

6. Elevation Using Impersonation  [State: Mitigation Implemented]  [Priority: High] 

Category:Elevation Of Privilege
Description:Web Server may be able to impersonate the context of Agent in order to gain additional privilege.
Justification:Mitigacion: Implementar controles de acceso y autenticación más estrictos para evitar la suplantación de identidad.

7. Web Server May be Subject to Elevation of Privilege Using Remote Code Execution  [State: Mitigation Implemented]  [Priority: High] 

Category:Elevation Of Privilege
Description:Agent may be able to remotely execute code for Web Server.
Justification:Mitigacion: Implementar parches y controles para prevenir la ejecución remota de código.

8. Elevation by Changing the Execution Flow in Web Server  [State: Mitigation Implemented]  [Priority: High] 

Category:Elevation Of Privilege
Description:An attacker may pass data into Web Server in order to change the flow of program execution within Web Server to the attacker's choosing.
Justification:Mitigacion: Validar todos los datos de entrada y asegurar el flujo de ejecución del servidor.

9. Spoofing of the Agent External Destination Entity  [State: Mitigation Implemented]  [Priority: High] 

Category:Spoofing
Description:Agent may be spoofed by an attacker and this may lead to data being sent to the attacker's target instead of Agent. Consider using a standard authentication mechanism to identify the external entity.
Justification:Mitigacion: Implementar autenticación estándar para asegurar la identidad de las entidades externas.

Interaction: Admin->SQL

Admin->SQL interaction screenshot

10. Spoofing of Destination Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

11. Possible SQL Injection Vulnerability for SQL Database Credentials & products  [State: Mitigation Implemented]  [Priority: High] 

Category:Tampering
Description:SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.
Justification:Mitigacion: revisar procedimientos que construyen consultas SQL y utilizar consultas parametrizadas.

Interaction: Agent -> SQL

Agent -> SQL interaction screenshot

12. Possible SQL Injection Vulnerability for SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.
Justification:<no mitigation provided>

13. Spoofing of Destination Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

Interaction: Backupdatos_IN

Backupdatos_IN interaction screenshot

14. Spoofing of Source Data Store Cloud Storage  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Cloud Storage may be spoofed by an attacker and this may lead to incorrect data delivered to SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the source data store.
Justification:<no mitigation provided>

15. Spoofing of Destination Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

16. Data Store Denies SQL Database Credentials & products Potentially Writing Data  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:SQL Database Credentials & products claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

17. Data Flow Backupdatos_IN Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

18. Data Store Inaccessible  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent prevents access to a data store on the other side of the trust boundary.
Justification:<no mitigation provided>

Interaction: Backupdatos_OUT

Backupdatos_OUT interaction screenshot

19. Spoofing of Source Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to incorrect data delivered to Cloud Storage. Consider using a standard authentication mechanism to identify the source data store.
Justification:<no mitigation provided>

20. Spoofing of Destination Data Store Cloud Storage  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Cloud Storage may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of Cloud Storage. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

21. Data Store Denies Cloud Storage Potentially Writing Data  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:Cloud Storage claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

22. Data Flow Backupdatos_OUT Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

23. Data Store Inaccessible  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent prevents access to a data store on the other side of the trust boundary.
Justification:<no mitigation provided>

Interaction: CardAuth_ACK

CardAuth_ACK interaction screenshot

24. Spoofing the Authorization Provider External Entity  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Authorization Provider may be spoofed by an attacker and this may lead to unauthorized access to Web Server. Consider using a standard authentication mechanism to identify the external entity.
Justification:<no mitigation provided>

25. Cross Site Scripting  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:The web server 'Web Server' could be a subject to a cross-site scripting attack because it does not sanitize untrusted input.
Justification:<no mitigation provided>

26. Potential Data Repudiation by Web Server  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:Web Server claims that it did not receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

27. Potential Process Crash or Stop for Web Server  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:Web Server crashes, halts, stops or runs slowly; in all cases violating an availability metric.
Justification:<no mitigation provided>

28. Data Flow CardAuth_ACK Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

29. Elevation Using Impersonation  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Web Server may be able to impersonate the context of Authorization Provider in order to gain additional privilege.
Justification:<no mitigation provided>

30. Web Server May be Subject to Elevation of Privilege Using Remote Code Execution  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Authorization Provider may be able to remotely execute code for Web Server.
Justification:<no mitigation provided>

31. Elevation by Changing the Execution Flow in Web Server  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:An attacker may pass data into Web Server in order to change the flow of program execution within Web Server to the attacker's choosing.
Justification:<no mitigation provided>

Interaction: CardAuth_REQ

CardAuth_REQ interaction screenshot

32. Spoofing of the Authorization Provider External Destination Entity  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Authorization Provider may be spoofed by an attacker and this may lead to data being sent to the attacker's target instead of Authorization Provider. Consider using a standard authentication mechanism to identify the external entity.
Justification:<no mitigation provided>

33. External Entity Authorization Provider Potentially Denies Receiving Data  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:Authorization Provider claims that it did not receive data from a process on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

34. Data Flow CardAuth_REQ Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

35. Weakness in SSO Authorization  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Common SSO implementations such as OAUTH2 and OAUTH Wrap are vulnerable to MitM attacks.
Justification:<no mitigation provided>

Interaction: Server->Logs

Server->Logs interaction screenshot

36. Spoofing the Web Server Process  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Web Server may be spoofed by an attacker and this may lead to unauthorized access to NoSQL logs. Consider using a standard authentication mechanism to identify the source process.
Justification:<no mitigation provided>

37. Spoofing of Destination Data Store NoSQL logs  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:NoSQL logs may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of NoSQL logs. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

38. The NoSQL logs Data Store Could Be Corrupted  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:Data flowing across Server->Logs may be tampered with by an attacker. This may lead to corruption of NoSQL logs. Ensure the integrity of the data flow to the data store.
Justification:<no mitigation provided>

39. Data Store Denies NoSQL logs Potentially Writing Data  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:NoSQL logs claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

40. Potential Excessive Resource Consumption for Web Server or NoSQL logs  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:Does Web Server or NoSQL logs take explicit steps to control resource consumption? Resource consumption attacks can be hard to deal with, and there are times that it makes sense to let the OS do the job. Be careful that your resource requests don't deadlock, and that they do timeout.
Justification:<no mitigation provided>

41. Data Flow Server->Logs Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

42. Data Store Inaccessible  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent prevents access to a data store on the other side of the trust boundary.
Justification:<no mitigation provided>

Interaction: Server->SQL

Server->SQL interaction screenshot

43. Spoofing the Web Server Process  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Web Server may be spoofed by an attacker and this may lead to unauthorized access to SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the source process.
Justification:<no mitigation provided>

44. Spoofing of Destination Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

45. Potential SQL Injection Vulnerability for SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.
Justification:<no mitigation provided>

46. The SQL Database Credentials & products Data Store Could Be Corrupted  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:Data flowing across Server->SQL may be tampered with by an attacker. This may lead to corruption of SQL Database Credentials & products. Ensure the integrity of the data flow to the data store.
Justification:<no mitigation provided>

47. Data Store Denies SQL Database Credentials & products Potentially Writing Data  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:SQL Database Credentials & products claims that it did not write data received from an entity on the other side of the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

48. Data Flow Sniffing  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:Data flowing across Server->SQL may be sniffed by an attacker. Depending on what type of data an attacker can read, it may be used to attack other parts of the system or simply be a disclosure of information leading to compliance violations. Consider encrypting the data flow.
Justification:<no mitigation provided>

49. Potential Excessive Resource Consumption for Web Server or SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:Does Web Server or SQL Database Credentials & products take explicit steps to control resource consumption? Resource consumption attacks can be hard to deal with, and there are times that it makes sense to let the OS do the job. Be careful that your resource requests don't deadlock, and that they do timeout.
Justification:<no mitigation provided>

50. Data Flow Server->SQL Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

51. Data Store Inaccessible  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent prevents access to a data store on the other side of the trust boundary.
Justification:<no mitigation provided>

Interaction: SQL --> Agent

SQL --> Agent interaction screenshot

52. Weak Access Control for a Resource  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:Improper data protection of SQL Database Credentials & products can allow an attacker to read information not intended for disclosure. Review authorization settings.
Justification:<no mitigation provided>

53. Spoofing of Source Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to incorrect data delivered to Agent. Consider using a standard authentication mechanism to identify the source data store.
Justification:<no mitigation provided>

Interaction: SQL->Admin

SQL->Admin interaction screenshot

54. Spoofing of Source Data Store SQL Database Credentials & products  [State: Mitigation Implemented]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to incorrect data delivered to Admin. Consider using a standard authentication mechanism to identify the source data store.
Justification:Mitigacion: Implementar mecanismos de autenticaci&#243;n est&#225;ndar para verificar la identidad de la base de datos de origen.

55. Weak Access Control for a Resource  [State: Mitigation Implemented]  [Priority: High] 

Category:Information Disclosure
Description:Improper data protection of SQL Database Credentials & products can allow an attacker to read information not intended for disclosure. Review authorization settings.
Justification:Mitigacion: Revisar las configuraciones de autorizaci&#243;n para garantizar que solo los usuarios autorizados tengan acceso a los datos sensibles.

Interaction: SQL->Logs

SQL->Logs interaction screenshot

56. Spoofing of Source Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to incorrect data delivered to NoSQL logs. Consider using a standard authentication mechanism to identify the source data store.
Justification:<no mitigation provided>

57. Spoofing of Destination Data Store NoSQL logs  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:NoSQL logs may be spoofed by an attacker and this may lead to data being written to the attacker's target instead of NoSQL logs. Consider using a standard authentication mechanism to identify the destination data store.
Justification:<no mitigation provided>

Interaction: SQL->Server

SQL->Server interaction screenshot

58. Spoofing the Web Server Process  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Web Server may be spoofed by an attacker and this may lead to information disclosure by SQL Database Credentials & products. Consider using a standard authentication mechanism to identify the destination process.
Justification:<no mitigation provided>

59. Spoofing of Source Data Store SQL Database Credentials & products  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:SQL Database Credentials & products may be spoofed by an attacker and this may lead to incorrect data delivered to Web Server. Consider using a standard authentication mechanism to identify the source data store.
Justification:<no mitigation provided>

60. Cross Site Scripting  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:The web server 'Web Server' could be a subject to a cross-site scripting attack because it does not sanitize untrusted input.
Justification:<no mitigation provided>

61. Persistent Cross Site Scripting  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:The web server 'Web Server' could be a subject to a persistent cross-site scripting attack because it does not sanitize data store 'SQL Database Credentials & products' inputs and output.
Justification:<no mitigation provided>

62. Potential Data Repudiation by Web Server  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:Web Server claims that it did not receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

63. Weak Access Control for a Resource  [State: Not Started]  [Priority: High] 

Category:Information Disclosure
Description:Improper data protection of SQL Database Credentials & products can allow an attacker to read information not intended for disclosure. Review authorization settings.
Justification:<no mitigation provided>

64. Potential Process Crash or Stop for Web Server  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:Web Server crashes, halts, stops or runs slowly; in all cases violating an availability metric.
Justification:<no mitigation provided>

65. Data Flow SQL->Server Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

66. Data Store Inaccessible  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent prevents access to a data store on the other side of the trust boundary.
Justification:<no mitigation provided>

67. Web Server May be Subject to Elevation of Privilege Using Remote Code Execution  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:SQL Database Credentials & products may be able to remotely execute code for Web Server.
Justification:<no mitigation provided>

68. Elevation by Changing the Execution Flow in Web Server  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:An attacker may pass data into Web Server in order to change the flow of program execution within Web Server to the attacker's choosing.
Justification:<no mitigation provided>

Interaction: WebAccess_IN

WebAccess_IN interaction screenshot

69. Spoofing the Browser Client Process  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Browser Client may be spoofed by an attacker and this may lead to unauthorized access to Web Server. Consider using a standard authentication mechanism to identify the source process.
Justification:<no mitigation provided>

70. Cross Site Scripting  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:The web server 'Web Server' could be a subject to a cross-site scripting attack because it does not sanitize untrusted input.
Justification:<no mitigation provided>

71. Potential Data Repudiation by Web Server  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:Web Server claims that it did not receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

72. Potential Process Crash or Stop for Web Server  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:Web Server crashes, halts, stops or runs slowly; in all cases violating an availability metric.
Justification:<no mitigation provided>

73. Data Flow WebAccess_IN Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

74. Elevation Using Impersonation  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Web Server may be able to impersonate the context of Browser Client in order to gain additional privilege.
Justification:<no mitigation provided>

75. Web Server May be Subject to Elevation of Privilege Using Remote Code Execution  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Browser Client may be able to remotely execute code for Web Server.
Justification:<no mitigation provided>

76. Elevation by Changing the Execution Flow in Web Server  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:An attacker may pass data into Web Server in order to change the flow of program execution within Web Server to the attacker's choosing.
Justification:<no mitigation provided>

77. Cross Site Request Forgery  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Cross-site request forgery (CSRF or XSRF) is a type of attack in which an attacker forces a user's browser to make a forged request to a vulnerable site by exploiting an existing trust relationship between the browser and the vulnerable web site. In a simple scenario, a user is logged in to web site A using a cookie as a credential. The other browses to web site B. Web site B returns a page with a hidden form that posts to web site A. Since the browser will carry the user's cookie to web site A, web site B now can take any action on web site A, for example, adding an admin to an account. The attack can be used to exploit any requests that the browser automatically authenticates, e.g. by session cookie, integrated authentication, IP whitelisting. The attack can be carried out in many ways such as by luring the victim to a site under control of the attacker, getting the user to click a link in a phishing email, or hacking a reputable web site that the victim will visit. The issue can only be resolved on the server side by requiring that all authenticated state-changing requests include an additional piece of secret payload (canary or CSRF token) which is known only to the legitimate web site and the browser and which is protected in transit through SSL/TLS. See the Forgery Protection property on the flow stencil for a list of mitigations.
Justification:<no mitigation provided>

Interaction: WebAccess_OUT

WebAccess_OUT interaction screenshot

78. Spoofing the Web Server Process  [State: Not Started]  [Priority: High] 

Category:Spoofing
Description:Web Server may be spoofed by an attacker and this may lead to unauthorized access to Browser Client. Consider using a standard authentication mechanism to identify the source process.
Justification:<no mitigation provided>

79. Web Server Process Memory Tampered  [State: Not Started]  [Priority: High] 

Category:Tampering
Description:If Web Server is given access to memory, such as shared memory or pointers, or is given the ability to control what Browser Client executes (for example, passing back a function pointer.), then Web Server can tamper with Browser Client. Consider if the function could work with less access to memory, such as passing data rather than pointers. Copy in data provided, and then validate it.
Justification:<no mitigation provided>

80. Potential Data Repudiation by Browser Client  [State: Not Started]  [Priority: High] 

Category:Repudiation
Description:Browser Client claims that it did not receive data from a source outside the trust boundary. Consider using logging or auditing to record the source, time, and summary of the received data.
Justification:<no mitigation provided>

81. Potential Process Crash or Stop for Browser Client  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:Browser Client crashes, halts, stops or runs slowly; in all cases violating an availability metric.
Justification:<no mitigation provided>

82. Data Flow WebAccess_OUT Is Potentially Interrupted  [State: Not Started]  [Priority: High] 

Category:Denial Of Service
Description:An external agent interrupts data flowing across a trust boundary in either direction.
Justification:<no mitigation provided>

83. Elevation Using Impersonation  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Browser Client may be able to impersonate the context of Web Server in order to gain additional privilege.
Justification:<no mitigation provided>

84. Browser Client May be Subject to Elevation of Privilege Using Remote Code Execution  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:Web Server may be able to remotely execute code for Browser Client.
Justification:<no mitigation provided>

85. Elevation by Changing the Execution Flow in Browser Client  [State: Not Started]  [Priority: High] 

Category:Elevation Of Privilege
Description:An attacker may pass data into Browser Client in order to change the flow of program execution within Browser Client to the attacker's choosing.
Justification:<no mitigation provided>