Einführungsmodi
Architecture and Design : COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.
Implementation
Anwendbare Plattformen
Sprache
Class: Not Language-Specific (Undetermined)
Technologien
Class: Not Technology-Specific (Undetermined)
Class: Web Based (Undetermined)
Name: Web Server (Undetermined)
Häufige Konsequenzen
| Bereich |
Auswirkung |
Wahrscheinlichkeit |
Confidentiality Access Control Availability Other | Bypass Protection Mechanism, Gain Privileges or Assume Identity, Varies by Context
Note: Attackers can bypass the security decision to access whatever is being protected. The consequences will depend on the associated functionality, but they can range from granting additional privileges to untrusted users to bypassing important security checks. Ultimately, this weakness may lead to exposure or modification of sensitive data, system crash, or execution of arbitrary code. | |
Beobachtete Beispiele
| Referenzen |
Beschreibung |
| Attacker can bypass authentication by setting a cookie to a specific value. |
| Attacker can bypass authentication and gain admin privileges by setting an "admin" cookie to 1. |
| Content management system allows admin privileges by setting a "login" cookie to "OK." |
| e-dating application allows admin privileges by setting the admin cookie to 1. |
| Web-based email list manager allows attackers to gain admin privileges by setting a login cookie to "admin." |
Mögliche Gegenmaßnahmen
Phases : Architecture and Design
Phases : Architecture and Design
Phases : Architecture and Design
For any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
Phases : Operation // Implementation
When using PHP, configure the application so that it does not use register_globals. During implementation, develop the application so that it does not rely on this feature, but be wary of implementing a register_globals emulation that is subject to weaknesses such as CWE-95, CWE-621, and similar issues.
Phases : Architecture and Design // Implementation
Erkennungsmethoden
Manual Static Analysis
Since this weakness does not typically appear frequently within a single software package, manual white box techniques may be able to provide sufficient code coverage and reduction of false positives if all potentially-vulnerable operations can be assessed within limited time constraints.
Wirksamkeit : High
Automated Static Analysis - Binary or Bytecode
Wirksamkeit : SOAR Partial
Manual Static Analysis - Binary or Bytecode
Wirksamkeit : SOAR Partial
Dynamic Analysis with Automated Results Interpretation
Wirksamkeit : SOAR Partial
Dynamic Analysis with Manual Results Interpretation
Wirksamkeit : SOAR Partial
Manual Static Analysis - Source Code
Wirksamkeit : High
Automated Static Analysis - Source Code
Wirksamkeit : SOAR Partial
Architecture or Design Review
Wirksamkeit : High
Hinweise zur Schwachstellen-Zuordnung
Begründung : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Kommentar : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Referenzen
REF-754
Top 25 Series - Rank 6 - Reliance on Untrusted Inputs in a Security Decision
Frank Kim.
https://www.sans.org/blog/top-25-series-rank-6-reliance-on-untrusted-inputs-in-a-security-decision/ REF-529
HMAC
https://en.wikipedia.org/wiki/HMAC REF-756
Understanding ASP.NET View State
Scott Mitchell.
https://learn.microsoft.com/en-us/previous-versions/dotnet/articles/ms972976(v=msdn.10)?redirectedfrom=MSDN REF-45
OWASP Enterprise Security API (ESAPI) Project
OWASP.
https://owasp.org/www-project-enterprise-security-api/ REF-1479
State-of-the-Art Resources (SOAR) for Software Vulnerability Detection, Test, and Evaluation
Gregory Larsen, E. Kenneth Hong Fong, David A. Wheeler, Rama S. Moorthy.
https://www.ida.org/-/media/feature/publications/s/st/stateoftheart-resources-soar-for-software-vulnerability-detection-test-and-evaluation/p-5061.ashx
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
Version |
| CWE Content Team |
MITRE |
2010-01-18 +00:00 |
2010-02-16 +00:00 |
1.8 |
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CWE Content Team |
MITRE |
2010-06-21 +00:00 |
updated Common_Consequences, Potential_Mitigations, References |
| CWE Content Team |
MITRE |
2010-09-27 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences |
| CWE Content Team |
MITRE |
2011-06-27 +00:00 |
updated Common_Consequences, Relationships |
| CWE Content Team |
MITRE |
2011-09-13 +00:00 |
updated Potential_Mitigations, References, Relationships, Taxonomy_Mappings |
| CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated Demonstrative_Examples, References, Relationships |
| CWE Content Team |
MITRE |
2012-10-30 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2013-07-17 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2014-02-18 +00:00 |
updated Potential_Mitigations |
| CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Detection_Factors |
| CWE Content Team |
MITRE |
2017-01-19 +00:00 |
updated Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Likelihood_of_Exploit, Modes_of_Introduction, References, Relationships, Taxonomy_Mappings |
| CWE Content Team |
MITRE |
2019-01-03 +00:00 |
updated Taxonomy_Mappings |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2022-04-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Potential_Mitigations, References, Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes, Relationships |
| CWE Content Team |
MITRE |
2025-09-09 +00:00 |
updated Detection_Factors, References |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Applicable_Platforms, Relationships, Weakness_Ordinalities |