Modos de introducción
Architecture and Design : This weakness may occur when characters from various character sets are allowed to be interchanged within a URL, username, email address, etc. without any notification to the user or underlying system being used.
Implementation
Plataformas aplicables
Lenguaje
Class: Not Language-Specific (Undetermined)
Tecnologías
Class: Not Technology-Specific (Undetermined)
Class: Web Based (Sometimes)
Consecuencias comunes
| Alcance |
Impacto |
Probabilidad |
Integrity Confidentiality | Other
Note: An attacker may ultimately redirect a user to a malicious website, by deceiving the user into believing the URL they are accessing is a trusted domain. However, the attack can also be used to forge log entries by using homoglyphs in usernames. Homoglyph manipulations are often the first step towards executing advanced attacks such as stealing a user's credentials, Cross-Site Scripting (XSS), or log forgery. If an attacker redirects a user to a malicious site, the attacker can mimic a trusted domain to steal account credentials and perform actions on behalf of the user, without the user's knowledge. Similarly, an attacker could create a username for a website that contains homoglyph characters, making it difficult for an admin to review logs and determine which users performed which actions. | |
Ejemplos observados
| Referencias |
Descripción |
| web forum allows impersonation of users with homoglyphs in account names |
| Improper character restriction in URLs in web browser |
| Incomplete denylist does not include homoglyphs of "/" and "?" characters in URLs |
| web browser does not convert hyphens to punycode, allowing IDN spoofing in URLs |
| homoglyph spoofing using punycode in URLs and certificates |
| homoglyph spoofing using punycode in URLs and certificates |
| homoglyph spoofing using punycode in URLs and certificates |
Mitigaciones potenciales
Phases : Implementation
Phases : Implementation
Métodos de detección
Manual Dynamic Analysis
If utilizing user accounts, attempt to submit a username that contains homoglyphs. Similarly, check to see if links containing homoglyphs can be sent via email, web browsers, or other mechanisms.
Efectividad : Moderate
Notas de mapeo de vulnerabilidades
Justificación : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comentario : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Patrones de ataque relacionados
| CAPEC-ID |
Nombre del patrón de ataque |
| CAPEC-632 |
Homograph Attack via Homoglyphs
An adversary registers a domain name containing a homoglyph, leading the registered domain to appear the same as a trusted domain. A homograph attack leverages the fact that different characters among various character sets look the same to the user. Homograph attacks must generally be combined with other attacks, such as phishing attacks, in order to direct Internet traffic to the adversary-controlled destinations. |
Referencias
REF-7
Writing Secure Code
Michael Howard, David LeBlanc.
https://www.microsoftpressstore.com/store/writing-secure-code-9780735617223 REF-8
The 2011 IDN Homograph Attack Mitigation Survey
Gregory Baatard, Peter Hannay.
https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1174&context=ecuworks2012
Envío
| Nombre |
Organización |
Fecha |
Fecha de lanzamiento |
Version |
| CWE Content Team |
MITRE |
2017-07-24 +00:00 |
2017-11-08 +00:00 |
2.12 |
Modificaciones
| Nombre |
Organización |
Fecha |
Comentario |
| CWE Content Team |
MITRE |
2018-03-27 +00:00 |
updated Demonstrative_Examples, Description, References |
| CWE Content Team |
MITRE |
2019-01-03 +00:00 |
updated Demonstrative_Examples, Description, Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Applicable_Platforms, Relationships |
| CWE Content Team |
MITRE |
2020-06-25 +00:00 |
updated Observed_Examples |
| CWE Content Team |
MITRE |
2022-10-13 +00:00 |
updated Demonstrative_Examples |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Demonstrative_Examples, Description, Related_Attack_Patterns |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
| CWE Content Team |
MITRE |
2025-09-09 +00:00 |
updated References |
| CWE Content Team |
MITRE |
2025-12-11 +00:00 |
updated Applicable_Platforms |