Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-302:Authentication Bypass by Assumed-Immutable Data
Weakness ID:302
Version:v4.17
Weakness Name:Authentication Bypass by Assumed-Immutable Data
Vulnerability Mapping:Allowed
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

▼Extended Description

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfAllowed-with-ReviewC1390Weak Authentication
ChildOfAllowedB807Reliance on Untrusted Inputs in a Security Decision
Nature: ChildOf
Mapping: Allowed-with-Review
Type: Class
ID: 1390
Name: Weak Authentication
Nature: ChildOf
Mapping: Allowed
Type: Base
ID: 807
Name: Reliance on Untrusted Inputs in a Security Decision
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC724OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
MemberOfProhibitedC859The CERT Oracle Secure Coding Standard for Java (2011) Chapter 16 - Platform Security (SEC)
MemberOfProhibitedC949SFP Secondary Cluster: Faulty Endpoint Authentication
MemberOfProhibitedC1010Authenticate Actors
MemberOfProhibitedC1353OWASP Top Ten 2021 Category A07:2021 - Identification and Authentication Failures
MemberOfProhibitedC1396Comprehensive Categorization: Access Control
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 724
Name: OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 859
Name: The CERT Oracle Secure Coding Standard for Java (2011) Chapter 16 - Platform Security (SEC)
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 949
Name: SFP Secondary Cluster: Faulty Endpoint Authentication
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1010
Name: Authenticate Actors
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1353
Name: OWASP Top Ten 2021 Category A07:2021 - Identification and Authentication Failures
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1396
Name: Comprehensive Categorization: Access Control
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-294Not Language-Specific Weaknesses
MemberOfProhibitedBSBOSS-316Bypass Protection Mechanism (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-294
Name: Not Language-Specific Weaknesses
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-316
Name: Bypass Protection Mechanism (impact)
▼Relevant To View
Relevant to the view"Architectural Concepts - (1008)"
NatureMappingTypeIDName
MemberOfProhibitedC1010Authenticate Actors
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1010
Name: Authenticate Actors
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1353OWASP Top Ten 2021 Category A07:2021 - Identification and Authentication Failures
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1353
Name: OWASP Top Ten 2021 Category A07:2021 - Identification and Authentication Failures
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC949SFP Secondary Cluster: Faulty Endpoint Authentication
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 949
Name: SFP Secondary Cluster: Faulty Endpoint Authentication
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
Access ControlN/ABypass Protection Mechanism
N/A
Scope: Access Control
Likelihood: N/A
Impact: Bypass Protection Mechanism
Note:
N/A
▼Potential Mitigations
Phase:Architecture and Design, Operation, Implementation
Mitigation ID:
Strategy:
Effectiveness:
Description:

Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)

Note:

▼Modes Of Introduction
Phase: Architecture and Design
Note:

COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.

Phase: Implementation
Note:

N/A

▼Applicable Platforms
Languages
Class: Not Language-Specific(Undetermined Prevalence)
▼Demonstrative Examples
Example 1

In the following example, an "authenticated" cookie is used to determine whether or not a user should be granted access to a system.

Language: ( code)
N/A

Language: Java(Bad code)
boolean authenticated = new Boolean(getCookieValue("authenticated")).booleanValue(); if (authenticated) { ... }

Language: ( code)
N/A

Modifying the value of a cookie on the client-side is trivial, but many developers assume that cookies are essentially immutable.

▼Observed Examples
ReferenceDescription
CVE-2002-0367
DebPloit
CVE-2004-0261
Web auth
CVE-2002-1730
Authentication bypass by setting certain cookies to "true".
CVE-2002-1734
Authentication bypass by setting certain cookies to "true".
CVE-2002-2064
Admin access by setting a cookie.
CVE-2002-2054
Gain privileges by setting cookie.
CVE-2004-1611
Product trusts authentication information in cookie.
CVE-2005-1708
Authentication bypass by setting admin-testing variable to true.
CVE-2005-1787
Bypass auth and gain privileges by setting a variable.
Reference: CVE-2002-0367
Description:
DebPloit
Reference: CVE-2004-0261
Description:
Web auth
Reference: CVE-2002-1730
Description:
Authentication bypass by setting certain cookies to "true".
Reference: CVE-2002-1734
Description:
Authentication bypass by setting certain cookies to "true".
Reference: CVE-2002-2064
Description:
Admin access by setting a cookie.
Reference: CVE-2002-2054
Description:
Gain privileges by setting cookie.
Reference: CVE-2004-1611
Description:
Product trusts authentication information in cookie.
Reference: CVE-2005-1708
Description:
Authentication bypass by setting admin-testing variable to true.
Reference: CVE-2005-1787
Description:
Bypass auth and gain privileges by setting a variable.
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Allowed
      Reason:Acceptable-Use
      Rationale:

      This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

      Comments:

      Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      PLOVERN/AN/AAuthentication Bypass via Assumed-Immutable Data
      OWASP Top Ten 2004A1CWE More SpecificUnvalidated Input
      The CERT Oracle Secure Coding Standard for Java (2011)SEC02-JN/ADo not base security checks on untrusted sources
      Taxonomy Name: PLOVER
      Entry ID: N/A
      Fit: N/A
      Entry Name: Authentication Bypass via Assumed-Immutable Data
      Taxonomy Name: OWASP Top Ten 2004
      Entry ID: A1
      Fit: CWE More Specific
      Entry Name: Unvalidated Input
      Taxonomy Name: The CERT Oracle Secure Coding Standard for Java (2011)
      Entry ID: SEC02-J
      Fit: N/A
      Entry Name: Do not base security checks on untrusted sources
      ▼Related Attack Patterns
      IDName
      CAPEC-10
      Buffer Overflow via Environment Variables
      CAPEC-13
      Subverting Environment Variable Values
      CAPEC-21
      Exploitation of Trusted Identifiers
      CAPEC-274
      HTTP Verb Tampering
      CAPEC-31
      Accessing/Intercepting/Modifying HTTP Cookies
      CAPEC-39
      Manipulating Opaque Client-based Data Tokens
      CAPEC-45
      Buffer Overflow via Symbolic Links
      CAPEC-77
      Manipulating User-Controlled Variables
      ID: CAPEC-10
      Name: Buffer Overflow via Environment Variables
      ID: CAPEC-13
      Name: Subverting Environment Variable Values
      ID: CAPEC-21
      Name: Exploitation of Trusted Identifiers
      ID: CAPEC-274
      Name: HTTP Verb Tampering
      ID: CAPEC-31
      Name: Accessing/Intercepting/Modifying HTTP Cookies
      ID: CAPEC-39
      Name: Manipulating Opaque Client-based Data Tokens
      ID: CAPEC-45
      Name: Buffer Overflow via Symbolic Links
      ID: CAPEC-77
      Name: Manipulating User-Controlled Variables
      ▼References
      Details not found