Description
The product allows an entity to perform a legitimate but expensive operation before authentication or authorization has taken place.
Potential Impact
Availability
DoS: Amplification, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU), DoS: Resource Consumption (Memory)
Demonstrative Examples
function printFile($username,$filename){
//read file into string
$file = file_get_contents($filename);if ($file && isOwnerOf($username,$filename)){echo $file;return true;}else{echo 'You are not authorized to view this file';}return false;
}Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2004-2458 | Tool creates directories before authenticating user. |
Related Weaknesses
Taxonomy Mappings
- PLOVER: — Early Amplification
Frequently Asked Questions
What is CWE-408?
CWE-408 (Incorrect Behavior Order: Early Amplification) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Base-level weakness. The product allows an entity to perform a legitimate but expensive operation before authentication or authorization has taken place.
How can CWE-408 be exploited?
Attackers can exploit CWE-408 (Incorrect Behavior Order: Early Amplification) to dos: amplification, dos: crash, exit, or restart, dos: resource consumption (cpu), dos: resource consumption (memory). This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-408?
Follow secure coding practices, conduct code reviews, and use automated security testing tools (SAST/DAST) to detect this weakness early in the development lifecycle.
What is the severity of CWE-408?
CWE-408 is classified as a Base-level weakness (Medium abstraction). It has been observed in 1 real-world CVEs.