Some authentication mechanisms rely on the client to generate the hash for a password, possibly to reduce load on the server or avoid sending the password across the network. However, when the client is used to generate the hash, an attacker can bypass the authentication by obtaining a copy of the hash, e.g. by using SQL injection to compromise a database of authentication credentials, or by exploiting an information exposure. The attacker could then use a modified client to replay the stolen hash without having knowledge of the original password.
As a result, the server-side comparison against a client-side hash does not provide any more security than the use of passwords without hashing.
Scope | Impact | Likelihood |
---|---|---|
Access Control | Bypass Protection Mechanism, Gain Privileges or Assume Identity Note: An attacker could bypass the authentication routine without knowing the original password. |
References | Description |
---|---|
CVE-2009-1283 | Product performs authentication with user-supplied password hashes that can be obtained from a separate SQL injection vulnerability (CVE-2009-1282). |
CVE-2005-3435 | Product allows attackers to bypass authentication by obtaining the password hash for another user and specifying the hash in the pwd argument. |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-644 | Use of Captured Hashes (Pass The Hash) An adversary obtains (i.e. steals or purchases) legitimate Windows domain credential hash values to access systems within the domain that leverage the Lan Man (LM) and/or NT Lan Man (NTLM) authentication protocols. |
CAPEC-652 | Use of Known Kerberos Credentials An adversary obtains (i.e. steals or purchases) legitimate Kerberos credentials (e.g. Kerberos service account userID/password or Kerberos Tickets) with the goal of achieving authenticated access to additional systems, applications, or services within the domain. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CWE Content Team | MITRE | 1.12 |
Name | Organization | Date | Comment |
---|---|---|---|
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Observed_Examples | |
CWE Content Team | MITRE | updated Modes_of_Introduction, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Description | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |