CWE-302: Authentication Bypass by Assumed-Immutable Data

Base Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

常见后果

影响范围: Access Control

技术影响: Bypass Protection Mechanism

潜在缓解措施

阶段: Architecture and Design Operation Implementation

描述: Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)

观察示例

参考: CVE-2002-0367

DebPloit

参考: CVE-2004-0261

Web auth

参考: CVE-2002-1730

Authentication bypass by setting certain cookies to "true".

参考: CVE-2002-1734

Authentication bypass by setting certain cookies to "true".

参考: CVE-2002-2064

Admin access by setting a cookie.

参考: CVE-2002-2054

Gain privileges by setting cookie.

参考: CVE-2004-1611

Product trusts authentication information in cookie.

参考: CVE-2005-1708

Authentication bypass by setting admin-testing variable to true.

参考: CVE-2005-1787

Bypass auth and gain privileges by setting a variable.

引入模式

阶段 说明
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.
Implementation -

适用平台

编程语言
Not Language-Specific (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
PLOVER - Authentication Bypass via Assumed-Immutable Data -
OWASP Top Ten 2004 A1 Unvalidated Input CWE More Specific
The CERT Oracle Secure Coding Standard for Java (2011) SEC02-J Do not base security checks on untrusted sources -
关键信息

CWE ID: CWE-302

抽象级别: Base

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-10 CAPEC-13 CAPEC-21 CAPEC-274 CAPEC-31 CAPEC-39 CAPEC-45 CAPEC-77