CWE-301: Reflection Attack in an Authentication Protocol
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.
常见后果
影响范围: Access Control
技术影响: Gain Privileges or Assume Identity
说明: The primary result of reflection attacks is successful authentication with a target machine -- as an impersonated user.
潜在缓解措施
阶段: Architecture and Design
描述: Use different keys for the initiator and responder or of a different type of challenge for the initiator and responder.
阶段: Architecture and Design
描述: Let the initiator prove its identity before proceeding.
观察示例
参考: CVE-2005-3435
product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic. |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| CLASP | - | Reflection attack in an auth protocol | - |
| OWASP Top Ten 2007 | A7 | Broken Authentication and Session Management | CWE More Specific |