[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Using Referer Field for Authentication

ID: 293Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Variant





Description

The referer field in HTTP requests can be easily modified and, as such, is not a valid means of message integrity checking.

Likelihood of Exploit: High

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Gain privileges / assume identity
 
Actions, which may not be authorized otherwise, can be carried out as if they were validated by the server referred to.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
 
 In order to usefully check if a given action is authorized, some means of strong authentication and method protection must be used. Use other means of authorization that cannot be simply spoofed. Possibilities include a username/password or certificate.
 
  

Relationships

Related CWETypeViewChain
CWE-293 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples   (Details)

  1. The following code samples check a packet's referer in order to decide whether or not an inbound request is from a trusted host.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
CLASP  Using referrer field for authentication
 
 

References:

  1. Mark Dowd John McDonald Justin Schuh .The Art of Software Security Assessment 1st Edition. Addison Wesley. Section:'Chapter 17, "Referer Request Header", Page 1030.'. Published on 2006.

© SecPod Technologies