Modes d'introduction
Implementation : When the software uses certificate pinning, the developer might not properly validate all relevant components of the certificate before pinning the certificate. This can make it difficult or expensive to test after the pinning is complete.
Implementation : REALIZATION: This weakness is caused during implementation of an architectural security tactic.
Plateformes applicables
Langue
Class: Not Language-Specific (Undetermined)
Conséquences courantes
Portée |
Impact |
Probabilité |
Integrity Other | Other
Note: The data read from the system vouched for by the expired certificate may be flawed due to malicious spoofing. | |
Authentication Other | Other
Note: Trust afforded to the system in question - based on the expired certificate - may allow for spoofing attacks. | |
Mesures d’atténuation potentielles
Phases : Architecture and Design
Check for expired certificates and provide the user with adequate information about the nature of the problem and how to proceed.
Phases : Implementation
If certificate pinning is being used, ensure that all relevant properties of the certificate are fully validated before the certificate is pinned, including the expiration.
Notes de cartographie des vulnérabilités
Justification : This CWE entry is at the Variant level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Commentaire : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Références
REF-18
The CLASP Application Security Process
Secure Software, Inc..
https://cwe.mitre.org/documents/sources/TheCLASPApplicationSecurityProcess.pdf REF-44
24 Deadly Sins of Software Security
Michael Howard, David LeBlanc, John Viega.
Soumission
Nom |
Organisation |
Date |
Date de publication |
Version |
CLASP |
|
2006-07-19 +00:00 |
2006-07-19 +00:00 |
Draft 3 |
Modifications
Nom |
Organisation |
Date |
Commentaire |
Eric Dalci |
Cigital |
2008-07-01 +00:00 |
updated Time_of_Introduction |
CWE Content Team |
MITRE |
2008-09-08 +00:00 |
updated Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings |
CWE Content Team |
MITRE |
2009-03-10 +00:00 |
updated Description, Name, Relationships |
CWE Content Team |
MITRE |
2009-05-27 +00:00 |
updated Demonstrative_Examples |
CWE Content Team |
MITRE |
2009-07-27 +00:00 |
updated Demonstrative_Examples |
CWE Content Team |
MITRE |
2009-10-29 +00:00 |
updated Description, Other_Notes |
CWE Content Team |
MITRE |
2011-06-01 +00:00 |
updated Common_Consequences |
CWE Content Team |
MITRE |
2012-05-11 +00:00 |
updated References, Relationships |
CWE Content Team |
MITRE |
2013-02-21 +00:00 |
updated Applicable_Platforms, Demonstrative_Examples, Relationships, Type |
CWE Content Team |
MITRE |
2013-07-17 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2014-07-30 +00:00 |
updated Relationships |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated Demonstrative_Examples, Modes_of_Introduction, Relationships |
CWE Content Team |
MITRE |
2018-03-27 +00:00 |
updated Common_Consequences, Modes_of_Introduction, Potential_Mitigations, Time_of_Introduction |
CWE Content Team |
MITRE |
2019-09-19 +00:00 |
updated Demonstrative_Examples |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated References, Relationships |
CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships, Time_of_Introduction |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |