Authentication Bypass by Capture-replayID: 294 | Date: (C)2012-05-14 (M)2022-10-10 |
Type: weakness | Status: INCOMPLETE |
Abstraction Type: Base |
Description
A capture-replay flaw exists when the design of the software
makes it possible for a malicious user to sniff network traffic and bypass
authentication by replaying it to the server in question to the same effect as
the original message (or with minor changes).
Extended DescriptionCapture-replay attacks are common and can be difficult to defeat without
cryptography. They are a subset of network injection attacks that rely on
observing previously-sent valid commands, then changing them slightly if
necessary and resending the same commands to the server.
Likelihood of Exploit: High
Applicable PlatformsLanguage Class: All
Time Of Introduction
Related Attack Patterns
Common Consequences
Scope | Technical Impact | Notes |
---|
Access_Control | Gain privileges / assume
identity | Messages sent with a capture-relay attack allow access to resources
which are not otherwise accessible without proper authentication. |
Detection MethodsNone
Potential Mitigations
Phase | Strategy | Description | Effectiveness | Notes |
---|
Architecture and Design | | Utilize some sequence or time stamping functionality along with a
checksum which takes this into account in order to ensure that messages
can be parsed only once. | | |
Architecture and Design | | Since any attacker who can listen to traffic can see sequence
numbers, it is necessary to sign messages with some kind of cryptography
to ensure that sequence numbers are not simply doctored along with
content. | | |
Relationships
Related CWE | Type | View | Chain |
---|
CWE-294 ChildOf CWE-902 | Category | CWE-888 | |
Demonstrative ExamplesNone
Observed Examples
- CVE-2005-3435 : product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
- CVE-2007-4961 : Chain: cleartext transmission of the MD5 hash of password (CWE-319) enables attacks against a server that is susceptible to replay (CWE-294).
For more examples, refer to CVE relations in the bottom box.
White Box Definitions None
Black Box Definitions None
Taxynomy Mappings
Taxynomy | Id | Name | Fit |
---|
PLOVER | | Authentication bypass by replay | |
CLASP | | Capture-replay | |
References:None