CWE-293: Using Referer Field for Authentication

Variant Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The referer field in HTTP requests can be easily modified and, as such, is not a valid means of message integrity checking.

常见后果

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity

说明: Actions, which may not be authorized otherwise, can be carried out as if they were validated by the server referred to.

潜在缓解措施

阶段: Architecture and Design

描述: In order to usefully check if a given action is authorized, some means of strong authentication and method protection must be used. Use other means of authorization that cannot be simply spoofed. Possibilities include a username/password or certificate.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

引入模式

阶段 说明
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
CLASP - Using referrer field for authentication -
Software Fault Patterns SFP29 Faulty endpoint authentication -
关键信息

CWE ID: CWE-293

抽象级别: Variant

结构: Simple

状态: Draft

利用可能性: High

相关弱点