Authentication Bypass by Capture-replay |
Weakness ID: 294 (Weakness Base) | Status: Incomplete |
Description Summary
Extended Description
Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.
Scope | Effect |
---|---|
Authorization | Messages sent with a capture-relay attack allow access to resources which are not otherwise accessible without proper authentication. |
Example 1
Reference | Description |
---|---|
CVE-2005-3435 | product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks. |
Phase: Architecture and Design Utilize some sequence or time stamping functionality along with a checksum which takes this into account in order to ensure that messages can be parsed only once. |
Phase: Architecture and Design Since any attacker who can listen to traffic can see sequence numbers, it is necessary to sign messages with some kind of cryptography to ensure that sequence numbers are not simply doctored along with content. |
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Weakness Class | 592 | Authentication Bypass Issues | Development Concepts (primary)699 Research Concepts (primary)1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Authentication bypass by replay | ||
CLASP | Capture-replay |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Common Consequences, Relationships, Other Notes, Taxonomy Mappings | ||||
2009-05-27 | CWE Content Team | MITRE | Internal | |
updated Related Attack Patterns | ||||
2009-07-27 | CWE Content Team | MITRE | Internal | |
updated Description, Other Notes, Potential Mitigations | ||||
2009-10-29 | CWE Content Team | MITRE | Internal | |
updated Observed Examples |