Once an authorization failure is detected, access needs to be blocked. It is also useful to log (associated with the user's identity if possible) and flag these as possibly malicious activity for further analysis, or as input for application intrusion detection systems.
NB: the key concept for this card is allowing access, even though authorization checks were undertaken and detected a failure. See AT 8 for the similar authentication failure.
Kelly can bypass authorization controls because they do not fail securely (i.e. they default to allowing access)
Owasp ASVS (4.0): 4.1.5
Capec: 122
Owasp SCP: 79,80
Owasp Appsensor:
Safecode: 8,10,11
ASVS V4.1 - General Access Control Design
Password Guessing/Brute Force Attacks
Session Hijacking (Man-in-the-Middle)
Loading comments 0%