Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-287 (认证机制不恰当) — Vulnerability Class 1203

1203 vulnerabilities classified as CWE-287 (认证机制不恰当). AI Chinese analysis included.

CWE-287 represents a critical authentication weakness where a system fails to adequately verify the identity of an actor claiming a specific identity. This flaw typically allows attackers to bypass security controls by exploiting insufficient verification mechanisms, enabling unauthorized access through stolen credentials, brute-force attacks, or session hijacking. When authentication logic is flawed, malicious entities can impersonate legitimate users, leading to severe data breaches and privilege escalation. Developers mitigate this risk by implementing robust, multi-factor authentication protocols and ensuring that identity verification processes are rigorous and resistant to common attack vectors. By strictly validating credentials against secure, hashed databases and employing adaptive security measures, organizations can significantly reduce the likelihood of unauthorized access, thereby protecting sensitive information and maintaining system integrity against sophisticated cyber threats.

MITRE CWE Description
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Common Consequences (1)
Integrity, Confidentiality, Availability, Access ControlRead Application Data, Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands
This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.
Mitigations (1)
Architecture and DesignUse an authentication framework or library such as the OWASP ESAPI Authentication feature.
Examples (2)
The following code intends to ensure that the user is already logged in. If not, the code performs authentication with the user-provided username and password. If successful, it sets the loggedin and user cookies to "remember" that the user has already logged in. Finally, the code performs administrator tasks if the logged-in user has the "Administrator" username, as recorded in the user cookie.
my $q = new CGI; if ($q->cookie('loggedin') ne "true") { if (! AuthenticateUser($q->param('username'), $q->param('password'))) { ExitError("Error: you need to log in first"); } else { # Set loggedin and user cookies. $q->cookie( -name => 'loggedin', -value => 'true' ); $q->cookie( -name => 'user', -value => $q->param('username') ); } } if ($q->cookie('user') eq "Administrator") { DoAdministratorTasks(); }
Bad · Perl
GET /cgi-bin/vulnerable.cgi HTTP/1.1 Cookie: user=Administrator Cookie: loggedin=true [body of request]
Attack
In January 2009, an attacker was able to gain administrator access to a Twitter server because the server did not restrict the number of login attempts [REF-236]. The attacker targeted a member of Twitter's support team and was able to successfully guess the member's password using a brute force attack by guessing a large number of common words. After gaining access as the member of the support st…
CVE IDTitleCVSSSeverityPublished
CVE-2022-30124 Rocket.Chat 授权问题漏洞 — Rocket.Chat Mobile app 6.8 -2022-09-23
CVE-2022-35248 Rocket.Chat 授权问题漏洞 — Rocket.Chat 8.8 -2022-09-23
CVE-2021-45035 Velneo vClient Improper authentication — Velneo vClient 6.3 Medium2022-09-23
CVE-2022-39238 Improper Authentication in Arvados when using PAM as identity provider — arvados 4.2 Medium2022-09-23
CVE-2022-39231 Parse Server subject to Improper Authentication allowing Auth adapter app ID validation to be circumvented — parse-server 3.7 Low2022-09-23
CVE-2022-3173 Improper Authentication in snipe/snipe-it — snipe/snipe-it 7.1 -2022-09-17
CVE-2022-39205 Access Control Bypass in Onedev — onedev 9.0 Critical2022-09-13
CVE-2022-36106 Missing check for expiration time of password reset token in TYPO3 — typo3 5.4 Medium2022-09-13
CVE-2022-39801 Contributor License Agreement assistant 授权问题漏洞 — SAP GRC Access Control Emergency Access Management 8.8 -2022-09-13
CVE-2022-36092 XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action — xwiki-platform 7.5 High2022-09-08
CVE-2022-36073 RubyGems allows creation of users with arbitrary unverified emails — rubygems.org 8.3 High2022-09-07
CVE-2022-26858 Dell BIOS 授权问题漏洞 — CPG BIOS 6.1 Medium2022-09-06
CVE-2022-31020 Remote code execution in Indy's NODE_UPGRADE transaction — indy-node 8.8 High2022-09-06
CVE-2022-36071 Recovery codes abuse in SFTPGo — sftpgo 8.3 High2022-09-02
CVE-2022-34380 Dell CloudLink 授权问题漏洞 — CloudLink 9.3 Critical2022-09-01
CVE-2022-34379 Dell EMC CloudLink 授权问题漏洞 — CloudLink 9.4 Critical2022-09-01
CVE-2021-3632 Red Hat Single Sign-On 授权问题漏洞 — keycloak 8.1 -2022-08-26
CVE-2021-3827 Red Hat Keycloak 授权问题漏洞 — keycloak 6.8 -2022-08-23
CVE-2022-2336 Softing Secure Integration Server Improper Authentication — Secure Integration Server 9.8 Critical2022-08-17
CVE-2022-2662 Sequi PortBloque S Improper Authentication — PortBloque S 9.6 Critical2022-08-16
CVE-2022-37397 The software is vulnerable when using LDAP-based authentication in YCQL with Microsoft’s Active Directory — Yugabyte DB 8.3 High2022-08-12
CVE-2022-38180 JetBrains Ktor framework 授权问题漏洞 — Ktor 5.3 Medium2022-08-12
CVE-2022-2765 SourceCodester Company Website CMS settings improper authentication — Company Website CMS 6.3 Medium2022-08-11
CVE-2022-29083 Dell BIOS 授权问题漏洞 — CPG BIOS 6.8 Medium2022-08-09
CVE-2022-33732 SAMSUNG Mobile devices 安全漏洞 — Samsung Mobile Devices 6.2 Medium2022-08-05
CVE-2022-36296 WordPress ActiveDEMAND plugin <= 0.2.27 - Broken Authentication vulnerability — ActiveDEMAND 6.5 Medium2022-08-05
CVE-2022-2664 Private Cloud Management Platform POST Request global_config_query improper authentication — Private Cloud Management Platform 7.3 High2022-08-05
CVE-2022-35925 Missing rate limit in Authentication in bookwyrm — bookwyrm 5.3 Medium2022-08-02
CVE-2022-35629 Velociraptor Client ID Spoofing — Velociraptor 4.3 -2022-07-29
CVE-2016-0796 WordPress Plugin mb.miniAudioPlayer 安全漏洞 — WordPress Plugin mb.miniAudioPlayer-an 7.5 -2022-07-28

Vulnerabilities classified as CWE-287 (认证机制不恰当) represent 1203 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.