Do not make assumptions about the order or previous actions of a user. Re-perform authorization checks at each and every step.
Tom can bypass business rules by altering the usual process sequence or flow, or by undertaking the process in the incorrect order, or by manipulating date and time values used by the application, or by using valid features for unintended purposes, or by otherwise manipulating control data
Owasp ASVS (4.0): 4.1.2 ,4.2.1 ,4.3.3 ,7.3.4 ,11.1.1 ,11.1.2
Capec: 25 ,39 ,74 ,162 ,166 ,207
Owasp SCP: 10,32,93,94,189
Owasp Appsensor: ACE3
Safecode: 8,10,11,12
ASVS V4.1 - General Access Control Design
ASVS V4.2 - Operation Level Access Control
ASVS V4.3 - Other Access Control Considerations
ASVS V7.3 - Log Protection Requirements
ASVS V11.1 - Business Logic Security Requirements
Session Hijacking (Man-in-the-Middle)
Loading comments 0%