The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
Common Consequences 1
Scope: Access Control
Impact: Bypass Protection Mechanism
Potential Mitigations 1
Phase: Architecture and DesignOperationImplementation
Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)
Demonstrative Examples 1
In the following example, an "authenticated" cookie is used to determine whether or not a user should be granted access to a system.
Code Example:
Bad
Java
java
Modifying the value of a cookie on the client-side is trivial, but many developers assume that cookies are essentially immutable.