CWE-593 认证绕过:SSL对象创建后修改OpenSSL CTX对象

admin 2021年11月4日23:16:24评论83 views字数 1787阅读5分57秒阅读模式

CWE-593 认证绕过:SSL对象创建后修改OpenSSL CTX对象

Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created

结构: Simple

Abstraction: Variant

状态: Draft

被利用可能性: unkown

基本描述

The software modifies the SSL context after connection creation has begun.

扩展描述

If the program modifies the SSL_CTX object after creating SSL objects from it, there is the possibility that older SSL objects created from the original context could all be affected by that change.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 666 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 1000

  • cwe_Nature: ChildOf cwe_CWE_ID: 287 cwe_View_ID: 699 cwe_Ordinal: Primary

常见的影响

范围 影响 注释
Access Control Bypass Protection Mechanism No authentication takes place in this process, bypassing an assumed protection of encryption.
Confidentiality Read Application Data The encrypted communication between a user and a trusted host may be subject to a "man in the middle" sniffing attack.

可能的缓解方案

Architecture and Design

策略:

Use a language or a library that provides a cryptography framework at a higher level of abstraction.

Implementation

策略:

Most SSL_CTX functions have SSL counterparts that act on SSL-type objects.

Implementation

策略:

Applications should set up an SSL_CTX completely, before creating SSL objects from it.

示例代码

The following example demonstrates the weakness.

bad C

#define CERT "secret.pem"
#define CERT2 "secret2.pem"

int main(){

SSL_CTX ctx;
SSL
ssl;
init_OpenSSL();
seed_prng();

ctx = SSL_CTX_new(SSLv23_method());

if (SSL_CTX_use_certificate_chain_file(ctx, CERT) != 1)

int_error("Error loading certificate from file");

if (SSL_CTX_use_PrivateKey_file(ctx, CERT, SSL_FILETYPE_PEM) != 1)

int_error("Error loading private key from file");

if (!(ssl = SSL_new(ctx)))

int_error("Error creating an SSL context");

if ( SSL_CTX_set_default_passwd_cb(ctx, "new default password" != 1))

int_error("Doing something which is dangerous to do anyways");

if (!(ssl2 = SSL_new(ctx)))

int_error("Error creating an SSL context");

}

相关攻击模式

  • CAPEC-94

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年11月4日23:16:24
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-593 认证绕过:SSL对象创建后修改OpenSSL CTX对象http://cn-sec.com/archives/613090.html

发表评论

匿名网友 填写信息