[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Authentication Bypass by Assumed-Immutable Data

ID: 302Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Variant





Description

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Bypass protection mechanism
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
Operation
Implementation
 
 Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)
 
  

Relationships

Related CWETypeViewChain
CWE-302 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples   (Details)

  1. In the following example, an "authenticated" cookie is used to determine whether or not a user should be granted access to a system. Of course, modifying the value of a cookie on the client-side is trivial, but many developers assume that cookies are essentially immutable.

Observed Examples

  1. CVE-2002-0367 : DebPloit
  2. CVE-2004-0261 : Web auth
  3. CVE-2002-1730 : Authentication bypass by setting certain cookies to "true".
  4. CVE-2002-1734 : Authentication bypass by setting certain cookies to "true".
  5. CVE-2002-2064 : Admin access by setting a cookie.
  6. CVE-2002-2054 : Gain privileges by setting cookie.
  7. CVE-2004-1611 : Product trusts authentication information in cookie.
  8. CVE-2005-1708 : Authentication bypass by setting admin-testing variable to true.
  9. CVE-2005-1787 : Bypass auth and gain privileges by setting a variable.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Authentication Bypass via Assumed-Immutable Data
 
 
OWASP Top Ten 2004 A1
 
Unvalidated Input
 
CWE_More_Specific
 
CERT Java Secure Coding SEC02-J
 
Do not base security checks on untrusted sources
 
 

References:
None

CVE    4
SVE-001532
SVE-001534
SVE-001531
CVE-2021-1399
...

© SecPod Technologies