Authentication Bypass by Assumed-Immutable Data |
Weakness ID: 302 (Weakness Variant) | Status: Incomplete |
Description Summary
The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
Example 1
In the following example, an "authenticated" cookie is used to determine whether or not a user should be granted access to a system. Of course, modifying the value of a cookie on the client-side is trivial, but many developers assume that cookies are essentially immutable.
(Bad Code)
Example Language: Java
boolean authenticated = new Boolean(getCookieValue("authenticated")).booleanValue();
if (authenticated) {
...
}
Reference | Description |
---|---|
CVE-2002-0367 | DebPloit |
CVE-2004-0261 | Web auth |
CVE-2002-1730 | Authentication bypass by setting certain cookies to "true". |
CVE-2002-1734 | Authentication bypass by setting certain cookies to "true". |
CVE-2002-2064 | SecurityDatabase\User\Admin access by setting a cookie. |
CVE-2002-2054 | Gain privileges by setting cookie. |
CVE-2004-1611 | Product trusts authentication information in cookie. |
CVE-2005-1708 | Authentication bypass by setting admin-testing variable to true. |
CVE-2005-1787 | Bypass auth and gain privileges by setting a variable. |
Phases: Architecture and Design; Operation; Implementation Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.) |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 592 | Authentication Bypass Issues | Development Concepts (primary)699 Research Concepts (primary)1000 |
ChildOf | ![]() | 724 | OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ChildOf | ![]() | 807 | Reliance on Untrusted Inputs in a Security Decision | Research Concepts1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Authentication Bypass via Assumed-Immutable Data | ||
OWASP Top Ten 2004 | A1 | CWE More Specific | Unvalidated Input |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
10 | Buffer Overflow via Environment Variables | |
13 | Subverting Environment Variable Values | |
21 | Exploitation of Session Variables, Resource IDs and other Trusted Credentials | |
31 | Accessing/Intercepting/Modifying HTTP Cookies | |
39 | Manipulating Opaque Client-based Data Tokens | |
45 | Buffer Overflow via Symbolic Links | |
77 | Manipulating User-Controlled Variables |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Sean Eidemiller | Cigital | External | |
added/updated demonstrative examples | ||||
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Demonstrative Examples, Description | ||||
2009-03-10 | CWE Content Team | MITRE | Internal | |
updated Relationships |