CAPEC-21: Exploitation of Trusted Identifiers
Description
Extended Description
Attacks leveraging trusted identifiers typically result in the adversary laterally moving within the local network, since users are often allowed to authenticate to systems/applications within the network using the same identifier. This allows the adversary to obtain sensitive data, download/install malware on the system, pose as a legitimate user for social engineering purposes, and more.
Attacks on trusted identifiers take advantage of the fact that some software accepts user input without verifying its authenticity. Many server side processes are vulnerable to these attacks because the server to server communications have not been analyzed from a security perspective or the processes "trust" other systems because they are behind a firewall. Similarly, servers that use easy to guess or spoofable schemes for representing digital identity can also be vulnerable. Such systems frequently use schemes without cryptography and digital signatures (or with broken cryptography). Identifiers may be guessed or obtained due to insufficient randomness, poor protection (passed/stored in the clear), lack of integrity (unsigned), or improper correlation with access control policy enforcement points. Exposed configuration and properties files that contain sensitive data may additionally provide an adversary with the information needed to obtain these identifiers. An adversary may also "ride" an identifier via a malicious link, as is the case in Cross Site Request Forgery (CSRF) attacks.
Regardless of the attack vector, successful spoofing and impersonation of trusted credentials can lead to an adversary breaking authentication, authorization, and audit controls with the target system or application.
Severity :
High
Possibility :
High
Type :
Meta
Relationships with other CAPECs
This table shows the other attack patterns and high level categories that are related to this attack pattern.
Prerequisites
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- Server software must rely on weak identifier proof and/or verification schemes.
- Identifiers must have long lifetimes and potential for reusability.
- Server software must allow concurrent sessions to exist.
Skills required
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- Low To achieve a direct connection with the weak or non-existent server session access control, and pose as an authorized user
Taxonomy mappings
Mappings to ATT&CK, OWASP and other frameworks.
Resources required
Ability to deploy software on network.
Ability to communicate synchronously or asynchronously with server.
Related CWE
A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful.
CWE-6: J2EE Misconfiguration: Insufficient Session-ID Length
CWE-290: Authentication Bypass by Spoofing
CWE-302: Authentication Bypass by Assumed-Immutable Data
CWE-346: Origin Validation Error
CWE-384: Session Fixation
CWE-539: Use of Persistent Cookies Containing Sensitive Information
CWE-602: Client-Side Enforcement of Server-Side Security
CWE-642: External Control of Critical State Data
CWE-664: Improper Control of a Resource Through its Lifetime
Visit http://capec.mitre.org/ for more details.