Incorrect Comparison

Incomplete Pillar
Structure: Simple
Description

The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.

Extended Description

This Pillar covers several possibilities: - the comparison checks one factor incorrectly; - the comparison should consider multiple factors, but it does not check at least one of those factors at all; - the comparison checks the wrong factor.

Common Consequences 1
Scope: Other

Impact: Varies by Context

Demonstrative Examples 2

ID : DX-115

Consider an application in which Truck objects are defined to be the same if they have the same make, the same model, and were manufactured in the same year.

Code Example:

Bad
Java
java
Here, the equals() method only checks the make and model of the Truck objects, but the year of manufacture is not included.

ID : DX-116

This example defines a fixed username and password. The AuthenticateUser() function is intended to accept a username and a password from an untrusted user, and check to ensure that it matches the username and password. If the username and password match, AuthenticateUser() is intended to indicate that authentication succeeded.

Code Example:

Bad
C

/* Ignore CWE-259 (hard-coded password) and CWE-309 (use of password system for authentication) for this example. /

c
In AuthenticateUser(), the strncmp() call uses the string length of an attacker-provided inPass parameter in order to determine how many characters to check in the password. So, if the attacker only provides a password of length 1, the check will only examine the first byte of the application's password before determining success.
As a result, this partial comparison leads to improper authentication (Improper Authentication).
Any of these passwords would still cause authentication to succeed for the "admin" user:

Code Example:

Attack
bash
This significantly reduces the search space for an attacker, making brute force attacks more feasible.
The same problem also applies to the username, so values such as "a" and "adm" will succeed for the username.
While this demonstrative example may not seem realistic, see the Observed Examples for CVE entries that effectively reflect this same weakness.
Observed Examples 3
CVE-2021-3116Chain: Python-based HTTP Proxy server uses the wrong boolean operators (Use of Incorrect Operator) causing an incorrect comparison (Incorrect Comparison) that identifies an authN failure if all three conditions are met instead of only one, allowing bypass of the proxy authentication (Weak Authentication)
CVE-2020-15811Chain: Proxy uses a substring search instead of parsing the Transfer-Encoding header (Incorrect Comparison), allowing request splitting (Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')) and cache poisoning
CVE-2016-10003Proxy performs incorrect comparison of request headers, leading to infoleak
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
Not Technology-Specific : Undetermined
Modes of Introduction
Implementation
Related Attack Patterns
Notes
Research Gap Weaknesses related to this Pillar appear to be under-studied, especially with respect to classification schemes. Input from academic and other communities could help identify and resolve gaps or organizational difficulties within CWE.
MaintenanceThis entry likely has some relationships with case sensitivity (Improper Handling of Case Sensitivity), but case sensitivity is a factor in other types of weaknesses besides comparison. Also, in cryptography, certain attacks are possible when certain comparison operations do not take place in constant time, causing a timing-related information leak (Observable Timing Discrepancy).