Pinned fields
Click on the next to a field label to start pinning.
Details
Assignee
UnassignedUnassignedReporter
rainer.turnerrainer.turnerPriority
Medium
Details
Details
Assignee
Unassigned
UnassignedReporter
rainer.turner
rainer.turnerPriority
Checklist
Checklist
Checklist
Created August 4, 2023 at 5:41 AM
Updated August 4, 2023 at 3:27 PM
AS A Security Specialist
I WANT TO detect log entries that do not match the expected log structure
SO THAT I could detect log injections
Why is this important?
Risks of log injection are often left without (proper) attention. This is an entry point for bad actors to cause problems whose root cause is very hard to detect.
As the Messaging BB is one of the core components to provide reliable end-to-end service, improper actions, and undetected attacks might potentially cause a lot of harm. For example, sending within a short time period seemingly trusted messages to End Clients to check for relevant data at some hospital. This would be a very effective DDOS attack, as it would cause overload to the hospital´s IT systems without the latter being able to block a limited amount of request sources.
Scope
Custom developments are needed.
References