CWE-602: Client-Side Enforcement of Server-Side Security
CWE版本: 4.18
更新日期: 2025-09-09
弱点描述
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.
扩展描述
When the server relies on protection mechanisms placed on the client side, an attacker can modify the client-side behavior to bypass the protection mechanisms, resulting in potentially unexpected interactions between the client and server. The consequences will vary, depending on what the mechanisms are trying to protect.
常见后果
影响范围: Access Control Availability
技术影响: Bypass Protection Mechanism DoS: Crash, Exit, or Restart
说明: Client-side validation checks can be easily bypassed, allowing malformed or unexpected input to pass into the application, potentially as trusted data. This may lead to unexpected states, behaviors and possibly a resulting crash.
影响范围: Access Control
技术影响: Bypass Protection Mechanism Gain Privileges or Assume Identity
说明: Client-side checks for authentication can be easily bypassed, allowing clients to escalate their access levels and perform unintended actions.
潜在缓解措施
阶段: Architecture and Design
阶段: Architecture and Design
描述: If some degree of trust is required between the two entities, then use integrity checking and strong authentication to ensure that the inputs are coming from a trusted source. Design the product so that this trust is managed in a centralized fashion, especially if there are complex or numerous communication channels, in order to reduce the risks that the implementer will mistakenly omit a check in a single code path.
阶段: Testing
描述: Use dynamic tools and techniques that interact with the software using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The software's operation may slow down, but it should not become unstable, crash, or generate incorrect results.
阶段: Testing
描述: Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.
观察示例
参考: CVE-2022-33139
SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.
参考: CVE-2006-6994
ASP program allows upload of .asp files by bypassing client-side checks.
参考: CVE-2007-0163
steganography products embed password information in the carrier file, which can be extracted from a modified client.
参考: CVE-2007-0164
steganography products embed password information in the carrier file, which can be extracted from a modified client.
参考: CVE-2007-0100
client allows server to modify client's configuration and overwrite arbitrary files.
引入模式
| 阶段 | 说明 |
|---|---|
| Architecture and Design | COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic. |
| Architecture and Design | Consider a product that consists of two or more processes or nodes that must interact closely, such as a client/server model. If the product uses protection schemes in the client in order to defend from attacks against the server, and the server does not use the same schemes, then an attacker could modify the client in a way that bypasses those schemes. This is a fundamental design flaw that is primary to many weaknesses. |
适用平台
编程语言
技术
分类映射
| 分类名称 | 条目ID | 条目名称 | 映射适配度 |
|---|---|---|---|
| OWASP Top Ten 2004 | A1 | Unvalidated Input | CWE More Specific |
关键信息
CWE ID: CWE-602
抽象级别: Class
结构: Simple
状态: Draft
利用可能性: Medium