CWE-602: Client-Side Enforcement of Server-Side Security

ID CWE-602
Abstraction Class
Structure Simple
Status Draft
Number of CVEs 31
The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.

When the server relies on protection mechanisms placed on the client side, an attacker can modify the client-side behavior to bypass the protection mechanisms, resulting in potentially unexpected interactions between the client and server. The consequences will vary, depending on what the mechanisms are trying to protect.

Modes of Introduction

Phase Note
Architecture and Design COMMISSION: This weakness refers to an incorrect design related to an architectural security tactic.
Architecture and Design Consider a product that consists of two or more processes or nodes that must interact closely, such as a client/server model. If the product uses protection schemes in the client in order to defend from attacks against the server, and the server does not use the same schemes, then an attacker could modify the client in a way that bypasses those schemes. This is a fundamental design flaw that is primary to many weaknesses.

Applicable Platforms

Type Class Name Prevalence
Language Not Language-Specific
Technology ICS/OT
Technology Mobile

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-693 Protection Mechanism Failure Pillar Simple Draft
CWE-1000 Research Concepts Draft CWE-471 Modification of Assumed-Immutable Data (MAID) Base Simple Draft
CWE-1000 Research Concepts Draft CWE-290 Authentication Bypass by Spoofing Base Simple Incomplete
CWE-1000 Research Concepts Draft CWE-300 Channel Accessible by Non-Endpoint Class Simple Draft

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-21 Exploitation of Trusted Identifiers CWE-602
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies CWE-602
CAPEC-162 Manipulating Hidden Fields CWE-602
CAPEC-202 Create Malicious Client CWE-602
CAPEC-207 Removing Important Client Functionality CWE-602
CAPEC-208 Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements CWE-602
CAPEC-383 Harvesting Information via API Event Monitoring CWE-602
CAPEC-384 Application API Message Manipulation via Man-in-the-Middle CWE-602
CAPEC-385 Transaction or Event Tampering via Application API Manipulation CWE-602
CAPEC-386 Application API Navigation Remapping CWE-602
CAPEC-387 Navigation Remapping To Propagate Malicious Content CWE-602
CAPEC-388 Application API Button Hijacking CWE-602

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...