Description
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
CWE-862
CWE-862
CWE-288
CWE-424
CWE-471
CWE-98
Consequences
Confidentiality, Integrity, Availability, Access Control: Read Application Data, Modify Application Data, Execute Unauthorized Code or Commands, Gain Privileges or Assume Identity
Potential Mitigations
Phase: Architecture and Design, Operation
Description:
Apply appropriate access control authorizations for each access to all restricted URLs, scripts or files.
Phase: Architecture and Design
Description:
Consider using MVC based frameworks such as Struts.
CVE References
- CVE-2004-2144
- Bypass authentication via direct request.
- CVE-2005-1892
- Infinite loop or infoleak triggered by direct requests.
- CVE-2004-2257
- Bypass auth/auth via direct request.
- CVE-2005-1688
- Direct request leads to infoleak by error.
- CVE-2005-1697
- Direct request leads to infoleak by error.
- CVE-2005-1698
- Direct request leads to infoleak by error.
- CVE-2005-1685
- Authentication bypass via direct request.
- CVE-2005-1827
- Authentication bypass via direct request.
- CVE-2005-1654
- Authorization bypass using direct request.
- CVE-2005-1668
- Access privileged functionality using direct request.
- CVE-2002-1798
- Upload arbitrary files via direct request.
More Stories
The Most Dangerous Vulnerabilities in Apache Tomcat and How to Protect Against Them
Apache Tomcat is an open-source web server and servlet container that is widely used in enterprise environments to run Java...
ZDI-CAN-18333: A Critical Zero-Day Vulnerability in Microsoft Windows
Zero-day vulnerabilities are a serious threat to cybersecurity, as they can be exploited by malicious actors to gain unauthorized access...
CWE-669 – Incorrect Resource Transfer Between Spheres
Description The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere,...
CWE-67 – Improper Handling of Windows Device Names
Description The software constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a...
CWE-670 – Always-Incorrect Control Flow Implementation
Description The code contains a control flow path that does not reflect the algorithm that the path is intended to...
CWE-671 – Lack of Administrator Control over Security
Description The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect...