CWE-294 使用捕获-重放进行的认证绕过

admin 2022年1月5日21:06:24CWE(弱点枚举)评论12 views1916字阅读6分23秒阅读模式

CWE-294 使用捕获-重放进行的认证绕过

Authentication Bypass by Capture-replay

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: High

基本描述

A capture-replay flaw exists when the design of the software makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

扩展描述

Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 1003 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
Access Control Gain Privileges or Assume Identity Messages sent with a capture-relay attack allow access to resources which are not otherwise accessible without proper authentication.

可能的缓解方案

Architecture and Design

策略:

Utilize some sequence or time stamping functionality along with a checksum which takes this into account in order to ensure that messages can be parsed only once.

Architecture and Design

策略:

Since any attacker who can listen to traffic can see sequence numbers, it is necessary to sign messages with some kind of cryptography to ensure that sequence numbers are not simply doctored along with content.

分析过的案例

标识 说明 链接
CVE-2005-3435 product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3435
CVE-2007-4961 Chain: cleartext transmission of the MD5 hash of password (CWE-319) enables attacks against a server that is susceptible to replay (CWE-294). https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4961

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
PLOVER Authentication bypass by replay
CLASP Capture-replay

相关攻击模式

  • CAPEC-102
  • CAPEC-60
  • CAPEC-94

文章来源于互联网:scap中文网

特别标注: 本站(CN-SEC.COM)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
  • 我的微信
  • 微信扫一扫
  • weinxin
  • 我的微信公众号
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2022年1月5日21:06:24
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                  CWE-294 使用捕获-重放进行的认证绕过 http://cn-sec.com/archives/612790.html

发表评论

匿名网友 填写信息

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: