CWE-565 在信任Cookie未进行验证与完整性检查

admin 2021年12月16日16:17:28评论126 views字数 1892阅读6分18秒阅读模式

CWE-565 在信任Cookie未进行验证与完整性检查

Reliance on Cookies without Validation and Integrity Checking

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: unkown

基本描述

The application relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

扩展描述

Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Reliance on cookies without detailed validation and integrity checking can allow attackers to bypass authentication, conduct injection attacks such as SQL injection and cross-site scripting, or otherwise modify inputs in unexpected ways.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 642 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 669 cwe_View_ID: 1003 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 602 cwe_View_ID: 1000

常见的影响

范围 影响 注释
Access Control Gain Privileges or Assume Identity It is dangerous to use cookies to set a user's privileges. The cookie can be manipulated to escalate an attacker's privileges to an administrative level.

可能的缓解方案

Architecture and Design

策略:

Avoid using cookie data for a security-related decision.

Implementation

策略:

Perform thorough input validation (i.e.: server side validation) on the cookie data if you're going to use it for a security related decision.

Architecture and Design

策略:

Add integrity checks to detect tampering.

Architecture and Design

策略:

Protect critical cookies from replay attacks, since cross-site scripting or other attacks may allow attackers to steal a strongly-encrypted cookie that also passes integrity checks. This mitigation applies to cookies that should only be valid during a single transaction or session. By enforcing timeouts, you may limit the scope of an attack. As part of your integrity check, use an unpredictable, server-side value that is not exposed to the client.

示例代码

The following code excerpt reads a value from a browser cookie to determine the role of the user.

bad Java

Cookie[] cookies = request.getCookies();
for (int i =0; iCookie c = cookies[i];
if (c.getName().equals("role")) {

userRole = c.getValue();

}

}文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日16:17:28
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-565 在信任Cookie未进行验证与完整性检查http://cn-sec.com/archives/613105.html

发表评论

匿名网友 填写信息