[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Direct Request ('Forced Browsing')

ID: 425Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Base





Description

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.

Extended Description

Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.

Applicable Platforms
Language Class: Language-independent

Time Of Introduction

  • Architecture and Design
  • Implementation
  • Operation

Related Attack Patterns

Common Consequences

ScopeTechnical ImpactNotes
Confidentiality
Integrity
Availability
Access_Control
 
Read application data
Modify application data
Execute unauthorized code or commands
Gain privileges / assume identity
 
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Architecture and Design
Operation
 
 Apply appropriate access control authorizations for each access to all restricted URLs, scripts or files.
 
  
Architecture and Design
 
 Consider using MVC based frameworks such as Struts.
 
  

Relationships
Overlaps Modification of Assumed-Immutable Data (MAID), authorization errors, container errors; often primary to other weaknesses such as XSS and SQL injection.

Related CWETypeViewChain
CWE-425 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples   (Details)

  1. If forced browsing is possible, an attacker may be able to directly access a sensitive page by entering a URL similar to the following.

Observed Examples

  1. CVE-2004-2144 : Bypass authentication via direct request.
  2. CVE-2005-1892 : Infinite loop or infoleak triggered by direct requests.
  3. CVE-2004-2257 : Bypass auth/auth via direct request.
  4. CVE-2005-1688 : Direct request leads to infoleak by error.
  5. CVE-2005-1697 : Direct request leads to infoleak by error.
  6. CVE-2005-1698 : Direct request leads to infoleak by error.
  7. CVE-2005-1685 : Authentication bypass via direct request.
  8. CVE-2005-1827 : Authentication bypass via direct request.
  9. CVE-2005-1654 : Authorization bypass using direct request.
  10. CVE-2005-1668 : Access privileged functionality using direct request.
  11. CVE-2002-1798 : Upload arbitrary files via direct request.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Direct Request aka 'Forced Browsing'
 
 
OWASP Top Ten 2007 A10
 
Failure to Restrict URL Access
 
CWE_More_Specific
 
OWASP Top Ten 2004 A1
 
Unvalidated Input
 
CWE_More_Specific
 
OWASP Top Ten 2004 A2
 
Broken Access Control
 
CWE_More_Specific
 
WASC 34
 
Predictable Resource Location
 
 

References:
None

CVE    56
CVE-2016-1000111
CVE-2021-24046
CVE-2017-10833
CVE-2017-14993
...

© SecPod Technologies