CWE-565: Reliance on Cookies without Validation and Integrity Checking

Base Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

常见后果

影响范围: Confidentiality Integrity Availability

技术影响: Modify Application Data Execute Unauthorized Code or Commands

说明: Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Reliance on cookies without detailed validation and integrity checking can allow attackers to bypass authentication, conduct injection attacks such as SQL injection and cross-site scripting, or otherwise modify inputs in unexpected ways.

影响范围: Access Control

技术影响: Gain Privileges or Assume Identity

说明: It is dangerous to use cookies to set a user's privileges. The cookie can be manipulated to escalate an attacker's privileges to an administrative level.

潜在缓解措施

阶段: Architecture and Design

描述: Avoid using cookie data for a security-related decision.

阶段: Implementation

描述: Perform thorough input validation (i.e.: server side validation) on the cookie data if you're going to use it for a security related decision.

阶段: Architecture and Design

描述: Add integrity checks to detect tampering.

阶段: Architecture and Design

描述: Protect critical cookies from replay attacks, since cross-site scripting or other attacks may allow attackers to steal a strongly-encrypted cookie that also passes integrity checks. This mitigation applies to cookies that should only be valid during a single transaction or session. By enforcing timeouts, you may limit the scope of an attack. As part of your integrity check, use an unpredictable, server-side value that is not exposed to the client.

检测方法

方法: Automated Static Analysis

Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.)

有效性: High

观察示例

参考: CVE-2008-5784

e-dating application allows admin privileges by setting the admin cookie to 1.

引入模式

阶段 说明
Architecture and Design OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.
Implementation -

分类映射

分类名称 条目ID 条目名称 映射适配度
Software Fault Patterns SFP29 Faulty endpoint authentication -
关键信息

CWE ID: CWE-565

抽象级别: Base

结构: Simple

状态: Incomplete

相关弱点
相关攻击模式
CAPEC-226 CAPEC-31 CAPEC-39