CWE-302: Authentication Bypass by Assumed-Immutable Data
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
常见后果
影响范围: Access Control
技术影响: Bypass Protection Mechanism
潜在缓解措施
阶段: Architecture and Design Operation Implementation
描述: Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)
观察示例
参考: CVE-2002-0367
DebPloit
参考: CVE-2004-0261
Web auth
参考: CVE-2002-1730
Authentication bypass by setting certain cookies to "true".
参考: CVE-2002-1734
Authentication bypass by setting certain cookies to "true".
参考: CVE-2002-2064
Admin access by setting a cookie.
参考: CVE-2002-2054
Gain privileges by setting cookie.
参考: CVE-2004-1611
Product trusts authentication information in cookie.
参考: CVE-2005-1708
Authentication bypass by setting admin-testing variable to true.
参考: CVE-2005-1787
Bypass auth and gain privileges by setting a variable.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic. |
| Implementation | - |
适用平台
编程语言
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| PLOVER | - | Authentication Bypass via Assumed-Immutable Data | - |
| OWASP Top Ten 2004 | A1 | Unvalidated Input | CWE More Specific |
| The CERT Oracle Secure Coding Standard for Java (2011) | SEC02-J | Do not base security checks on untrusted sources | - |
关键信息
CWE ID: CWE-302
抽象级别: Base
结构: Simple
状态: Incomplete