CWE-565 在信任Cookie未进行验证与完整性检查

Reliance on Cookies without Validation and Integrity Checking

结构: Simple

Abstraction: Base

状态: Incomplete

被利用可能性: unkown

基本描述

The application relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

扩展描述

Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Reliance on cookies without detailed validation and integrity checking can allow attackers to bypass authentication, conduct injection attacks such as SQL injection and cross-site scripting, or otherwise modify inputs in unexpected ways.

相关缺陷

  • cwe_Nature: ChildOf cwe_CWE_ID: 642 cwe_View_ID: 1000 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 669 cwe_View_ID: 1003 cwe_Ordinal: Primary

  • cwe_Nature: ChildOf cwe_CWE_ID: 602 cwe_View_ID: 1000

常见的影响

范围 影响 注释
Access Control Gain Privileges or Assume Identity It is dangerous to use cookies to set a user's privileges. The cookie can be manipulated to escalate an attacker's privileges to an administrative level.

可能的缓解方案

Architecture and Design

策略:

Avoid using cookie data for a security-related decision.

Implementation

策略:

Perform thorough input validation (i.e.: server side validation) on the cookie data if you're going to use it for a security related decision.

Architecture and Design

策略:

Add integrity checks to detect tampering.

Architecture and Design

策略:

Protect critical cookies from replay attacks, since cross-site scripting or other attacks may allow attackers to steal a strongly-encrypted cookie that also passes integrity checks. This mitigation applies to cookies that should only be valid during a single transaction or session. By enforcing timeouts, you may limit the scope of an attack. As part of your integrity check, use an unpredictable, server-side value that is not exposed to the client.

示例代码

The following code excerpt reads a value from a browser cookie to determine the role of the user.

bad Java

Cookie[] cookies = request.getCookies();
for (int i =0; i< cookies.length; i++) {
Cookie c = cookies[i];
if (c.getName().equals("role")) {
userRole = c.getValue();
}
}

It is easy for an attacker to modify the "role" value found in the locally stored cookie, allowing privilege escalation.

Notes

分类映射

映射的分类名 ImNode ID Fit Mapped Node Name
Software Fault Patterns SFP29 Faulty endpoint authentication

相关攻击模式

  • CAPEC-226
  • CAPEC-31
  • CAPEC-39