General Information

Log Forging

Variants:
Direct Persistent Session 

Also Known As:
Log Injection, Log Spoofing, Web Logs Tampering

Vector Type:
Attack

Relevance:
Generic

Layer:
Application-Level

Platforms:
Any

Target Type:
Application

Affected Mechanisms:
Input Validation, Output Sanitation, Syntax Escaping

Invented In:
09/05/2002

Added In:
21/12/2014


Vector Operation Method:
Attackers can mislead log auditors with fake log entries created using documented inputs that includes CRLF characters or similar log row delimiters. This attack can be used to incriminate other users for malicious actions, hide malicious activities or for similar purposes.


Direct Variant:

Log Forging

Also Known As:
Log Injection, Log Spoofing, Web Logs Tampering

Typical Severity:
Medium

Learn More:


Persistent Variant:

Second Order Log Forging

Also Known As:
Stored Log Forging

Typical Severity:
Medium

Resources:

White Papers:

Learn More:


Session Variant:

Log Forging via Session Puzzling

Variant Title:
Log Forging via Session Puzzling

Typical Severity:
Medium

Resources:

White Papers:

Learn More: