SFP Secondary Cluster: Faulty Endpoint Authentication
A category in the Common Weakness Enumeration published by The MITRE Corporation.
Categories in the Common Weakness Enumeration (CWE) group entries based on some common characteristic or attribute.
This category identifies Software Fault Patterns (SFPs) within the Faulty Endpoint Authentication cluster (SFP29).
The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
If a web server does not fully parse requested URLs before it examines them for authorization, it may be possible for an attacker to bypass authorization protection.
The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
The software does not properly verify that the source of data or communication is valid.
The application relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid fo...
The software performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address ...
Security based on event locations are insecure and can be spoofed.
The software defines policy namespaces and makes authorization decisions based on the assumption that a URL is canonical. This can allow a non-canonical URL to bypass ...
The referer field in HTTP requests can be easily modified and, as such, is not a valid means of message integrity checking.
CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).