[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Authentication Bypass Using an Alternate Path or Channel

ID: 288Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Base





Description

A product requires authentication, but the product has an alternate path or channel that does not require authentication.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Bypass protection mechanism
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 Funnel all access through a single choke point to simplify how users can access a resource. For every access, perform a check to determine if the user has permissions to access the resource.
 
  

Relationships
overlaps Unprotected Alternate Channel

Related CWETypeViewChain
CWE-288 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples
None

Observed Examples

  1. CVE-2000-1179 : Router allows remote attackers to read system logs without authentication by directly connecting to the login screen and typing certain control characters.
  2. CVE-1999-1454 : Attackers with physical access to the machine may bypass the password prompt by pressing the ESC (Escape) key.
  3. CVE-1999-1077 : OS allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock.
  4. CVE-2003-0304 : Direct request of installation file allows attacker to create administrator accounts.
  5. CVE-2002-0870 : Attackers may gain additional privileges by directly requesting the web management URL.
  6. CVE-2002-0066 : Bypass authentication via direct request to named pipe.
  7. CVE-2003-1035 : User can avoid lockouts by using an API instead of the GUI to conduct brute force password guessing.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Authentication Bypass by Alternate Path/Channel
 
 
OWASP Top Ten 2007 A10
 
Failure to Restrict URL Access
 
CWE_More_Specific
 

References:
None

CVE    12
SVE-002354
SVE-102354
SVE-102339
SVE-102338
...

© SecPod Technologies