[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Authentication Bypass by Primary Weakness

ID: 305Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Base





Description

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Bypass protection mechanism
 
 

Detection Methods
None

Potential Mitigations
None

Relationships
Most "authentication bypass" errors are resultant, not primary.

Related CWETypeViewChain
CWE-305 ChildOf CWE-898 Category CWE-888  

Demonstrative Examples
None

Observed Examples

  1. CVE-2002-1374 : The provided password is only compared against the first character of the real password.
  2. CVE-2000-0979 : The password is not properly checked, which allows remote attackers to bypass access controls by sending a 1-byte password that matches the first character of the real password.
  3. CVE-2001-0088 : Chain: Forum software does not properly initialize an array, which inadvertently sets the password to a single character, allowing remote attackers to easily guess the password and gain administrative privileges.

For more examples, refer to CVE relations in the bottom box.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
PLOVER  Authentication Bypass by Primary Weakness
 
 

References:
None

CVE    6
CVE-2021-21403
CVE-2021-3850
CVE-2020-10923
CVE-2020-14359
...

© SecPod Technologies