Authentication Bypass via Assumed-Immutable Data

Revision as of 13:16, 7 June 2006 by Weilin Zhong (Talk | contribs)

Jump to: navigation, search

Assumed-immutable authentication data can be modified by attackers to bypass the authentication. Most of the time, this vulnerability results from inappropriate session management, i.e., important data that is used for authentication decisions is sent to the client side and subject to user modification. This kind of data should be stored in the server-side session as much as possible.

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.

Related Problems

Privilege Escalation via Assumed-Immutable Data