For each entry point, check and test that the correct degree of authentication is required and occurs. Ensure this includes:
Access to remote systems. APIs. Non HTML content (e.g. files, images). Reporting. Any other 'internal' functionality. The key concept for this card is missing authentication. See AT Q for inconsistent authentication and AT K for changing the executing authentication code.
Mark can access resources or services because there is no authentication requirement, or it was mistakenly assumed authentication would be undertaken by some other system or performed in some previous action
Owasp ASVS (4.0): 1.4.3 ,1.4.5
Capec: 115
Owasp SCP: 23,32,34
Owasp Appsensor:
Safecode: 14,28
ASVS V1.4 - Access Control Architectural Requirements
Session Hijacking (Man-in-the-Middle)
Loading comments 0%