Authentication Bypass Using an Alternate Path or Channel |
Weakness ID: 288 (Weakness Base) | Status: Incomplete |
Description Summary
A product requires authentication, but the product has an alternate path or channel that does not require authentication.
This is often seen in web applications that assume that access to a particular CGI program can only be obtained through a "front" screen, when the supporting programs are directly accessible. But this problem is not just in web apps. |
Reference | Description |
---|---|
CVE-2000-1179 | |
CVE-1999-1454 | Attackers with physical access to the machine may bypass the password prompt by pressing the ESC (Escape) key. |
CVE-1999-1077 | |
CVE-2003-0304 | Direct request of installation file allows attacker to create administrator accounts. |
CVE-2002-0870 | Attackers may gain additional privileges by directly requesting the web management URL. |
CVE-2004-0213 | non-web |
CVE-2002-0066 | Bypass authentication via direct request to named pipe. |
CVE-2003-1035 | User can avoid lockouts by using an API instead of the GUI to conduct brute force password guessing. |
Funnel all access through a single choke point to simplify how users can access a resource. For every access, perform a check to determine if the user has permissions to access the resource. |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Class | 592 | Authentication Bypass Issues | Development Concepts (primary)699 Research Concepts (primary)1000 |
ChildOf | Category | 721 | OWASP Top Ten 2007 Category A10 - Failure to Restrict URL Access | Weaknesses in OWASP Top Ten (2007) (primary)629 |
PeerOf | Weakness Base | 420 | Unprotected Alternate Channel | Research Concepts1000 |
PeerOf | Weakness Base | 425 | Direct Request ('Forced Browsing') | Research Concepts1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Authentication Bypass by Alternate Path/Channel | ||
OWASP Top Ten 2007 | A10 | CWE More Specific | Failure to Restrict URL Access |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
56 | Removing/short-circuiting 'guard logic' |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Description, Modes of Introduction, Name, Relationships, Observed Example, Relationship Notes, Taxonomy Mappings, Type | ||||
2008-11-24 | CWE Content Team | MITRE | Internal | |
updated Observed Examples | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-09-09 | Authentication Bypass by Alternate Path/Channel | |||