CWE-301: Reflection Attack in an Authentication Protocol

Base Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.

常见后果

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity

说明: The primary result of reflection attacks is successful authentication with a target machine -- as an impersonated user.

潜在缓解措施

阶段: Architecture and Design

描述: Use different keys for the initiator and responder or of a different type of challenge for the initiator and responder.

阶段: Architecture and Design

描述: Let the initiator prove its identity before proceeding.

观察示例

参考: CVE-2005-3435

product authentication succeeds if user-provided MD5 hash matches the hash in its database; this can be subjected to replay attacks.

引入模式

阶段 说明
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
CLASP - Reflection attack in an auth protocol -
OWASP Top Ten 2007 A7 Broken Authentication and Session Management CWE More Specific
关键信息

CWE ID: CWE-301

抽象级别: Base

结构: Simple

状态: Draft

利用可能性: Medium

相关弱点
相关攻击模式
CAPEC-90