Improper Control of Interaction Frequency |
Weakness ID: 799 (Weakness Class) | Status: Incomplete |
Description Summary
Extended Description
This can allow the actor to perform actions more frequently than expected. The actor could be a human or an automated process such as a virus or bot. This could be used to cause a denial of service, compromise program logic (such as limiting humans to a single vote), or other consequences. For example, an authentication routine might not limit the number of times an attacker can guess a password. Or, a web site might conduct a poll but only expect humans to vote a maximum of once a day.
Insufficient anti-automation: | The term "insufficient anti-automation" focuses primarly on non-human actors such as viruses or bots, but the scope of this CWE entry is broader. |
---|---|
Brute force: | Vulnerabilities that can be targeted using brute force attacks are often symptomatic of this weakness. |
Ordinality | Description |
---|---|
Primary | (where the weakness exists independent of other weaknesses) |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 438 | Behavioral Problems | Development Concepts (primary)699 |
ChildOf | ![]() | 691 | Insufficient Control Flow Management | Research Concepts (primary)1000 |
ChildOf | ![]() | 808 | 2010 Top 25 - Weaknesses On the Cusp | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 307 | Improper Restriction of Excessive Authentication Attempts | Research Concepts1000 |
Web Application Security Consortium. "Insufficient Anti-automation". <http://projects.webappsec.org/Insufficient+Anti-automation>. |