CWE-287: Improper Authentication

Class Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

常见后果

影响范围: Integrity Confidentiality Availability Access Control

技术影响: Read Application Data Gain Privileges or Assume Identity Execute Unauthorized Code or Commands

说明: This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.

潜在缓解措施

阶段: Architecture and Design

策略: Libraries or Frameworks

描述: Use an authentication framework or library such as the OWASP ESAPI Authentication feature.

检测方法

方法: Automated Static Analysis

有效性: Limited

方法: Manual Static Analysis

有效性: High

方法: Manual Static Analysis - Binary or Bytecode

有效性: SOAR Partial

方法: Dynamic Analysis with Automated Results Interpretation

有效性: SOAR Partial

方法: Dynamic Analysis with Manual Results Interpretation

有效性: SOAR Partial

方法: Manual Static Analysis - Source Code

有效性: SOAR Partial

方法: Automated Static Analysis - Source Code

有效性: SOAR Partial

方法: Automated Static Analysis

有效性: SOAR Partial

方法: Architecture or Design Review

有效性: High

观察示例

参考: CVE-2024-11680

File-sharing PHP product does not check if user is logged in during requests for PHP library files under an includes/ directory, allowing configuration changes, code execution, and other impacts.

参考: CVE-2022-35248

Chat application skips validation when Central Authentication Service (CAS) is enabled, effectively removing the second factor from two-factor authentication

参考: CVE-2022-36436

Python-based authentication proxy does not enforce password authentication during the initial handshake, allowing the client to bypass authentication by specifying a 'None' authentication type.

参考: CVE-2022-30034

Chain: Web UI for a Python RPC framework does not use regex anchors to validate user login emails (CWE-777), potentially allowing bypass of OAuth (CWE-1390).

参考: CVE-2022-29951

TCP-based protocol in Programmable Logic Controller (PLC) has no authentication.

参考: CVE-2022-29952

Condition Monitor uses a protocol that does not require authentication.

参考: CVE-2022-30313

Safety Instrumented System uses proprietary TCP protocols with no authentication.

参考: CVE-2022-30317

Distributed Control System (DCS) uses a protocol that has no authentication.

参考: CVE-2022-33139

SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.

参考: CVE-2021-3116

Chain: Python-based HTTP Proxy server uses the wrong boolean operators (CWE-480) causing an incorrect comparison (CWE-697) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (CWE-1390)

参考: CVE-2021-21972

Chain: Cloud computing virtualization platform does not require authentication for upload of a tar format file (CWE-306), then uses .. path traversal sequences (CWE-23) in the file to access unexpected files, as exploited in the wild per CISA KEV.

参考: CVE-2021-37415

IT management product does not perform authentication for some REST API requests, as exploited in the wild per CISA KEV.

参考: CVE-2021-35033

Firmware for a WiFi router uses a hard-coded password for a BusyBox shell, allowing bypass of authentication through the UART port

参考: CVE-2020-10263

Bluetooth speaker does not require authentication for the debug functionality on the UART port, allowing root shell access

参考: CVE-2020-13927

Default setting in workflow management product allows all API requests without authentication, as exploited in the wild per CISA KEV.

参考: CVE-2021-35395

Stack-based buffer overflows in SFK for wifi chipset used for IoT/embedded devices, as exploited in the wild per CISA KEV.

参考: CVE-2021-34523

Mail server does not properly check an access token before executing a Powershell command, as exploited in the wild per CISA KEV.

参考: CVE-2020-12812

Chain: user is not prompted for a second authentication factor (CWE-287) when changing the case of their username (CWE-178), as exploited in the wild per CISA KEV.

参考: CVE-2020-10148

Authentication bypass by appending specific parameters and values to a URI, as exploited in the wild per CISA KEV.

参考: CVE-2020-0688

Mail server does not generate a unique key during installation, as exploited in the wild per CISA KEV.

参考: CVE-2017-14623

LDAP Go package allows authentication bypass using an empty password, causing an unauthenticated LDAP bind

参考: CVE-2009-3421

login script for guestbook allows bypassing authentication by setting a "login_ok" parameter to 1.

参考: CVE-2009-2382

admin script allows authentication bypass by setting a cookie value to "LOGGEDIN".

参考: CVE-2009-1048

VOIP product allows authentication bypass using 127.0.0.1 in the Host header.

参考: CVE-2009-2213

product uses default "Allow" action, instead of default deny, leading to authentication bypass.

参考: CVE-2009-2168

chain: redirect without exit (CWE-698) leads to resultant authentication bypass.

参考: CVE-2009-3107

product does not restrict access to a listening port for a critical service, allowing authentication to be bypassed.

参考: CVE-2009-1596

product does not properly implement a security-related configuration setting, allowing authentication bypass.

参考: CVE-2009-2422

authentication routine returns "nil" instead of "false" in some situations, allowing authentication bypass using an invalid username.

参考: CVE-2009-3232

authentication update script does not properly handle when admin does not select any authentication modules, allowing authentication bypass.

参考: CVE-2009-3231

use of LDAP authentication with anonymous binds causes empty password to result in successful authentication

参考: CVE-2005-3435

product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.

参考: CVE-2005-0408

chain: product generates predictable MD5 hashes using a constant value combined with username, allowing authentication bypass.

引入模式

阶段 说明
Architecture and Design -
Implementation REALIZATION: This weakness is caused during implementation of an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)
技术
ICS/OT (Often)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Authentication Error -
OWASP Top Ten 2007 A7 Broken Authentication and Session Management CWE More Specific
OWASP Top Ten 2004 A3 Broken Authentication and Session Management CWE More Specific
WASC 1 Insufficient Authentication -
ISA/IEC 62443 Part 3-3 Req SR 1.1 -
ISA/IEC 62443 Part 3-3 Req SR 1.2 -
ISA/IEC 62443 Part 4-2 Req CR 1.1 -
ISA/IEC 62443 Part 4-2 Req CR 1.2 -
关键信息

CWE ID: CWE-287

抽象级别: Class

结构: Simple

状态: Draft

利用可能性: High

相关弱点
相关攻击模式
CAPEC-114 CAPEC-115 CAPEC-151 CAPEC-194 CAPEC-22 CAPEC-57 CAPEC-593 CAPEC-633 CAPEC-650 CAPEC-94