CWE-294: Authentication Bypass by Capture-replay
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
扩展描述
Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.
常见后果
影响范围: Access Control
技术影响: Gain Privileges or Assume Identity
说明: Messages sent with a capture-relay attack allow access to resources which are not otherwise accessible without proper authentication.
潜在缓解措施
阶段: Architecture and Design
描述: Utilize some sequence or time stamping functionality along with a checksum which takes this into account in order to ensure that messages can be parsed only once.
阶段: Architecture and Design
描述: Since any attacker who can listen to traffic can see sequence numbers, it is necessary to sign messages with some kind of cryptography to ensure that sequence numbers are not simply doctored along with content.
观察示例
参考: CVE-2005-3435
product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
参考: CVE-2007-4961
Chain: cleartext transmission of the MD5 hash of password (CWE-319) enables attacks against a server that is susceptible to replay (CWE-294).
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic. |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Authentication bypass by replay | - |
| CLASP | - | Capture-replay | - |
关键信息
CWE ID: CWE-294
抽象级别: Base
结构: Simple
状态: Incomplete
利用可能性: High