CWE-602: Client-Side Enforcement of Server-Side Security

Class Draft Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.

扩展描述

When the server relies on protection mechanisms placed on the client side, an attacker can modify the client-side behavior to bypass the protection mechanisms, resulting in potentially unexpected interactions between the client and server. The consequences will vary, depending on what the mechanisms are trying to protect.

常见后果

影响范围: Access Control Availability

技术影响: Bypass Protection Mechanism DoS: Crash, Exit, or Restart

说明: Client-side validation checks can be easily bypassed, allowing malformed or unexpected input to pass into the application, potentially as trusted data. This may lead to unexpected states, behaviors and possibly a resulting crash.

影响范围: Access Control

技术影响: Bypass Protection Mechanism Gain Privileges or Assume Identity

说明: Client-side checks for authentication can be easily bypassed, allowing clients to escalate their access levels and perform unintended actions.

潜在缓解措施

阶段: Architecture and Design

阶段: Architecture and Design

描述: If some degree of trust is required between the two entities, then use integrity checking and strong authentication to ensure that the inputs are coming from a trusted source. Design the product so that this trust is managed in a centralized fashion, especially if there are complex or numerous communication channels, in order to reduce the risks that the implementer will mistakenly omit a check in a single code path.

阶段: Testing

描述: Use dynamic tools and techniques that interact with the software using large test suites with many diverse inputs, such as fuzz testing (fuzzing), robustness testing, and fault injection. The software's operation may slow down, but it should not become unstable, crash, or generate incorrect results.

阶段: Testing

描述: Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules.

观察示例

参考: CVE-2022-33139

SCADA system only uses client-side authentication, allowing adversaries to impersonate other users.

参考: CVE-2006-6994

ASP program allows upload of .asp files by bypassing client-side checks.

参考: CVE-2007-0163

steganography products embed password information in the carrier file, which can be extracted from a modified client.

参考: CVE-2007-0164

steganography products embed password information in the carrier file, which can be extracted from a modified client.

参考: CVE-2007-0100

client allows server to modify client's configuration and overwrite arbitrary files.

引入模式

阶段 说明
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.
Architecture and Design Consider a product that consists of two or more processes or nodes that must interact closely, such as a client/server model. If the product uses protection schemes in the client in order to defend from attacks against the server, and the server does not use the same schemes, then an attacker could modify the client in a way that bypasses those schemes. This is a fundamental design flaw that is primary to many weaknesses.

适用平台

编程语言
Not Language-Specific (Undetermined)
技术
ICS/OT (Undetermined) Mobile (Undetermined)

分类映射

分类名称 条目ID 条目名称 映射适配度
OWASP Top Ten 2004 A1 Unvalidated Input CWE More Specific
关键信息

CWE ID: CWE-602

抽象级别: Class

结构: Simple

状态: Draft

利用可能性: Medium

相关弱点
相关攻击模式
CAPEC-162 CAPEC-202 CAPEC-207 CAPEC-208 CAPEC-21 CAPEC-31 CAPEC-383 CAPEC-384 CAPEC-385 CAPEC-386 CAPEC-387 CAPEC-388