Description
The product uses a protection mechanism that relies on the existence or values of a cookie, but it does not properly ensure that the cookie is valid for the associated user.
Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Attackers can bypass protection mechanisms such as authorization and authentication by modifying the cookie to contain an expected value.
Potential Impact
Access Control
Bypass Protection Mechanism, Gain Privileges or Assume Identity
Demonstrative Examples
Cookie[] cookies = request.getCookies();for (int i =0; i< cookies.length; i++) {Cookie c = cookies[i];if (c.getName().equals("role")) {userRole = c.getValue();}}$auth = $_COOKIES['authenticated'];if (! $auth) {if (AuthenticateUser($_POST['user'], $_POST['password']) == "success") {// save the cookie to send out in future responsessetcookie("authenticated", "1", time()+60*60*2);}else {ShowLoginScreen();die("\n");}}DisplayMedicalHistory($_POST['patient_ID']);Cookie[] cookies = request.getCookies();for (int i =0; i< cookies.length; i++) {Cookie c = cookies[i];if (c.getName().equals("authenticated") && Boolean.TRUE.equals(c.getValue())) {authenticated = true;}}Mitigations & Prevention
Avoid using cookie data for a security-related decision.
Perform thorough input validation (i.e.: server side validation) on the cookie data if you're going to use it for a security related decision.
Add integrity checks to detect tampering.
Protect critical cookies from replay attacks, since cross-site scripting or other attacks may allow attackers to steal a strongly-encrypted cookie that also passes integrity checks. This mitigation applies to cookies that should only be valid during a single transaction or session. By enforcing timeouts, you may limit the scope of an attack. As part of your integrity check, use an unpredictable, server-side value that is not exposed to the client.
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2009-1549 | Attacker can bypass authentication by setting a cookie to a specific value. |
| CVE-2009-1619 | Attacker can bypass authentication and gain admin privileges by setting an "admin" cookie to 1. |
| CVE-2009-0864 | Content management system allows admin privileges by setting a "login" cookie to "OK." |
| CVE-2008-5784 | e-dating application allows admin privileges by setting the admin cookie to 1. |
| CVE-2008-6291 | Web-based email list manager allows attackers to gain admin privileges by setting a login cookie to "admin." |
Related Weaknesses
Frequently Asked Questions
What is CWE-784?
CWE-784 (Reliance on Cookies without Validation and Integrity Checking in a Security Decision) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Variant-level weakness. The product uses a protection mechanism that relies on the existence or values of a cookie, but it does not properly ensure that the cookie is valid for the associated user.
How can CWE-784 be exploited?
Attackers can exploit CWE-784 (Reliance on Cookies without Validation and Integrity Checking in a Security Decision) to bypass protection mechanism, gain privileges or assume identity. This weakness is typically introduced during the Implementation phase of software development.
How do I prevent CWE-784?
Key mitigations include: Avoid using cookie data for a security-related decision.
What is the severity of CWE-784?
CWE-784 is classified as a Variant-level weakness (Low-Medium abstraction). It has been observed in 5 real-world CVEs.