Difference between revisions of "Authentication Bypass via Assumed-Immutable Data"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to www.textcnalic.com)
 
(3 intermediate revisions by 2 users not shown)
Line 2: Line 2:
 
{{Template:Vulnerability}}
 
{{Template:Vulnerability}}
 
<br>
 
<br>
[[ASDR Table of Contents]]
 
 
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
  
 +
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]
  
 
==Description==
 
==Description==
Line 14: Line 13:
  
 
==Examples==
 
==Examples==
 
 
TBD
 
TBD
  

Latest revision as of 13:27, 27 May 2009

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.



Last revision (mm/dd/yy): 05/27/2009

Vulnerabilities Table of Contents

Description

Assumed-immutable authentication data can be modified by attackers to bypass the authentication. Most of the time, this vulnerability results from inappropriate session management, i.e., important data that is used for authentication decisions is sent to the client side and subject to user modification. This kind of data should be stored in the server-side session as much as possible.

Risk Factors

TBD

Examples

TBD

Related Attacks


Related Vulnerabilities


Related Controls


Related Technical Impacts


References

TBD