CWE-287: Improper Authentication
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
常见后果
影响范围: Integrity Confidentiality Availability Access Control
技术影响: Read Application Data Gain Privileges or Assume Identity Execute Unauthorized Code or Commands
说明: This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.
潜在缓解措施
阶段: Architecture and Design
策略: Libraries or Frameworks
描述: Use an authentication framework or library such as the OWASP ESAPI Authentication feature.
检测方法
方法: Automated Static Analysis
有效性: Limited
方法: Manual Static Analysis
有效性: High
方法: Manual Static Analysis - Binary or Bytecode
有效性: SOAR Partial
方法: Dynamic Analysis with Automated Results Interpretation
有效性: SOAR Partial
方法: Dynamic Analysis with Manual Results Interpretation
有效性: SOAR Partial
方法: Manual Static Analysis - Source Code
有效性: SOAR Partial
方法: Automated Static Analysis - Source Code
有效性: SOAR Partial
方法: Automated Static Analysis
有效性: SOAR Partial
方法: Architecture or Design Review
有效性: High
观察示例
参考: CVE-2024-11680
File-sharing PHP product does not check if user is logged in during requests for PHP library files under an includes/ directory, allowing configuration changes, code execution, and other impacts.
参考: CVE-2022-35248
Chat application skips validation when Central Authentication Service (CAS) is enabled, effectively removing the second factor from two-factor authentication
参考: CVE-2022-36436
Python-based authentication proxy does not enforce password authentication during the initial handshake, allowing the client to bypass authentication by specifying a 'None' authentication type.
参考: CVE-2022-30034
Chain: Web UI for a Python RPC framework does not use regex anchors to validate user login emails (CWE-777), potentially allowing bypass of OAuth (CWE-1390).
参考: CVE-2022-29951
TCP-based protocol in Programmable Logic Controller (PLC) has no authentication.
参考: CVE-2022-29952
Condition Monitor uses a protocol that does not require authentication.
参考: CVE-2022-30313
Safety Instrumented System uses proprietary TCP protocols with no authentication.
参考: CVE-2022-30317
Distributed Control System (DCS) uses a protocol that has no authentication.
参考: CVE-2022-33139
SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.
参考: CVE-2021-3116
Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390)
参考: CVE-2021-21972
Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV.
参考: CVE-2021-37415
IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV.
参考: CVE-2021-35033
Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port
参考: CVE-2020-10263
Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access
参考: CVE-2020-13927
Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV.
参考: CVE-2021-35395
Stack-based buffer overflows in SFK for wifi chipset used for IoT/embedded devices, as exploited in the wild per CISA KEV.
参考: CVE-2021-34523
Mail server does not properly check an access token before executing a Powershell command, as exploited in the wild per CISA KEV.
参考: CVE-2020-12812
Chain: user is not prompted for a second authentication factor (CWE-287) when changing the case of their username (CWE-178), as exploited in the wild per CISA KEV.
参考: CVE-2020-10148
Authentication bypass by appending specific parameters and values to a URI, as exploited in the wild per CISA KEV.
参考: CVE-2020-0688
Mail server does not generate a unique key during installation, as exploited in the wild per CISA KEV.
参考: CVE-2017-14623
LDAP Go package allows authentication bypass using an empty password, causing an unauthenticated LDAP bind
参考: CVE-2009-3421
login script for guestbook allows bypassing authentication by setting a "login_ok" parameter to 1.
参考: CVE-2009-2382
admin script allows authentication bypass by setting a cookie value to "LOGGEDIN".
参考: CVE-2009-1048
VOIP product allows authentication bypass using 127.0.0.1 in the Host header.
参考: CVE-2009-2213
product uses default "Allow" action, instead of default deny, leading to authentication bypass.
参考: CVE-2009-2168
chain: redirect without exit (CWE-698) leads to resultant authentication bypass.
参考: CVE-2009-3107
product does not restrict access to a listening port for a critical service, allowing authentication to be bypassed.
参考: CVE-2009-1596
product does not properly implement a security-related configuration setting, allowing authentication bypass.
参考: CVE-2009-2422
authentication routine returns "nil" instead of "false" in some situations, allowing authentication bypass using an invalid username.
参考: CVE-2009-3232
authentication update script does not properly handle when admin does not select any authentication modules, allowing authentication bypass.
参考: CVE-2009-3231
use of LDAP authentication with anonymous binds causes empty password to result in successful authentication
参考: CVE-2005-3435
product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
参考: CVE-2005-0408
chain: product generates predictable MD5 hashes using a constant value combined with username, allowing authentication bypass.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | - |
| Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
适用平台
编程语言
技术
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Authentication Error | - |
| OWASP Top Ten 2007 | A7 | Broken Authentication and Session Management | CWE More Specific |
| OWASP Top Ten 2004 | A3 | Broken Authentication and Session Management | CWE More Specific |
| WASC | 1 | Insufficient Authentication | - |
| ISA/IEC 62443 | Part 3-3 | Req SR 1.1 | - |
| ISA/IEC 62443 | Part 3-3 | Req SR 1.2 | - |
| ISA/IEC 62443 | Part 4-2 | Req CR 1.1 | - |
| ISA/IEC 62443 | Part 4-2 | Req CR 1.2 | - |
关键信息
CWE ID: CWE-287
抽象级别: Class
结构: Simple
状态: Draft
利用可能性: High