CWE一覧に戻る
CWE-203

観測可能な不一致

Observable Discrepancy
脆弱性 作成中
JA

不正な行為者が観察可能な方法で、製品が異なる状況下で異なる動作をしたり、異なる応答を送信したりすることで、特定の操作が成功したかどうかなど、製品の状態に関するセキュリティに関連する情報が公開される。

不一致には様々な形があり、タイミング、制御フロー、返信やリクエストなどの通信、または一般的な動作において検出可能なばらつきがあります。これらの不一致は、製品の動作や内部状態に関する情報を、権限のない行為者に明らかにする可能性がある。場合によっては、不一致は攻撃者がサイドチャネルを形成するために利用することができる。

EN

The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.

Discrepancies can take many forms, and variations may be detectable in timing, control flow, communications such as replies or requests, or general behavior. These discrepancies can reveal information about the product's operation or internal state to an unauthorized actor. In some cases, discrepancies can be used by attackers to form a side channel.

Scope: Confidentiality, Access Control / Impact: Read Application Data; Bypass Protection Mechanism
Scope: Confidentiality / Impact: Read Application Data
Compartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.

Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.
Ensure that error messages only contain minimal details that are useful to the intended audience and no one else. The messages need to strike the balance between being too cryptic (which can confuse users) or being too detailed (which may reveal more than intended). The messages should not reveal the methods that were used to determine the error. Attackers can use detailed information to refine or optimize their original attack, thereby increasing their chances of success.

If errors must be captured in some detail, record them in log messages, but consider what could occur if the log messages can be viewed by attackers. Highly sensitive information such as passwords should never be saved to log files.

Avoid inconsistent messaging that might accidentally tip off an attacker about internal state, such as whether a user account exists or not.
MITRE公式ページ — CWE-203