Trust of OpenSSL Certificate Without Validation |
Weakness ID: 599 (Weakness Variant) | Status: Incomplete |
Description Summary
Scope | Effect |
---|---|
Integrity | the data read may not be properly secured, it might be viewed by an attacker. |
Authentication | trust afforded to the system in question may allow for spoofing or redirection attacks. |
Example 1
Phase: Architecture and Design Ensure that proper authentication is included in the system design. |
Phase: Implementation Understand and properly implement all checks necessary to ensure the identity of entities involved in encrypted communications. |
If the certificate is not checked, it may be possible for a redirection or spoofing attack to allow a malicious host with a valid certificate to provide data under the guise of a trusted host. While the attacker in question may have a valid certificate, it may simply be a valid certificate for a different site. In order to ensure data integrity, we must check that the certificate is valid, and that it pertains to the site we wish to access. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 297 | Improper Validation of Host-specific Certificate Data | Development Concepts (primary)699 Research Concepts (primary)1000 |
Modifications | ||||
---|---|---|---|---|
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Common Consequences, Relationships, Other Notes | ||||
2009-03-10 | CWE Content Team | MITRE | Internal | |
updated Relationships | ||||
2009-07-27 | CWE Content Team | MITRE | Internal | |
updated Relationships | ||||
Previous Entry Names | ||||
Change Date | Previous Entry Name | |||
2008-04-11 | No OpenSSL Certificate Check Performed before Use | |||