CWE-649 依赖于未经完整性检查的安全相关输入的混淆或加密

admin 2021年12月16日16:27:13评论181 views字数 2442阅读8分8秒阅读模式

CWE-649 依赖于未经完整性检查的安全相关输入的混淆或加密

Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: High

基本描述

The software uses obfuscation or encryption of inputs that should not be mutable by an external actor, but the software does not use integrity checks to detect if those inputs have been modified.

扩展描述

When an application relies on obfuscation or incorrectly applied / weak encryption to protect client-controllable tokens or parameters, that may have an effect on the user state, system state, or some decision made on the server. Without protecting the tokens/parameters for integrity, the application is vulnerable to an attack where an adversary blindly traverses the space of possible values of the said token/parameter in order to attempt to gain an advantage. The goal of the attacker is to find another admissible value that will somehow elevate their privileges in the system, disclose information or change the behavior of the system in some way beneficial to the attacker. If the application does not protect these critical tokens/parameters for integrity, it will not be able to determine that these values have been tampered with. Measures that are used to protect data for confidentiality should not be relied upon to provide the integrity service.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 699 cwe_Ordinal: Primary

适用平台

Language: {'cwe_Class': 'Language-Independent', 'cwe_Prevalence': 'Undetermined'}

常见的影响

范围 影响 注释
Integrity Unexpected State The inputs could be modified without detection, causing the software to have unexpected system state or make incorrect security decisions.

可能的缓解方案

Architecture and Design

策略:

Protect important client controllable tokens/parameters for integrity using PKI methods (i.e. digital signatures) or other means, and checks for integrity on the server side.

Architecture and Design

策略:

Repeated requests from a particular user that include invalid values of tokens/parameters (those that should not be changed manually by users) should result in the user account lockout.

Architecture and Design

策略:

Client side tokens/parameters should not be such that it would be easy/predictable to guess another valid state.

Architecture and Design

策略:

Obfuscation should not be relied upon. If encryption is used, it needs to be properly applied (i.e. proven algorithm and implementation, use padding, use random initialization vector, user proper encryption mode). Even with proper encryption where the ciphertext does not leak information about the plaintext or reveal its structure, compromising integrity is possible (although less likely) without the provision of the integrity service.

分析过的案例

标识 说明 链接

相关攻击模式

  • CAPEC-463

文章来源于互联网:scap中文网

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年12月16日16:27:13
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CWE-649 依赖于未经完整性检查的安全相关输入的混淆或加密https://cn-sec.com/archives/613064.html

发表评论

匿名网友 填写信息