Skip to content

Commit e0ea72d

Browse files
committed
refactor(API2:2019): rename
API2:2019 was renamed Broken User Authentication to avoid misunderstandigs with client <-> api server authentication.
1 parent 4cd4d82 commit e0ea72d

File tree

5 files changed

+4
-6
lines changed

5 files changed

+4
-6
lines changed
-15 Bytes
Binary file not shown.
188 Bytes
Binary file not shown.

2019/en/src/0x00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Table of Contents
99
* [API Security Risks](0x10-api-security-risks.md)
1010
* [OWASP Top 10 API Security Risks – 2019](0x11-t10.md)
1111
* [API1:2019 Broken Object Level Authorization](0xa1-broken-object-level-authorization.md)
12-
* [API2:2019 Broken Authentication](0xa2-broken-authentication.md)
12+
* [API2:2019 Broken User Authentication](0xa2-broken-user-authentication.md)
1313
* [API3:2019 Excessive Data Exposure](0xa3-excessive-data-exposure.md)
1414
* [API4:2019 Lack of Resources & Rate Limiting](0xa4-lack-of-resources-and-rate-limiting.md)
1515
* [API5:2019 Broken Function Level Authorization](0xa5-broken-function-level-authorization.md)

2019/en/src/0x11-t10.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ OWASP Top 10 API Security Risks – 2019
44
| Risk | Description |
55
| ---- | ----------- |
66
| API1:2019 - Broken Object Level Authorization | APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be considered in every function that accesses a data source using an input from the user. |
7-
| API2:2019 - Broken Authentication | Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall. |
7+
| API2:2019 - Broken User Authentication | Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API security overall. |
88
| API3:2019 - Excessive Data Exposure | Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client's state, servers receive more-and-more filters which can be abused to gain access to sensitive data. |
99
| API4:2019 - Lack of Resources & Rate Limiting | Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force. |
1010
| API5:2019 - Broken Function Level Authorization | Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions. |

2019/en/src/0xa2-broken-authentication.md renamed to 2019/en/src/0xa2-broken-user-authentication.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
API2:2019 Broken Authentication
2-
===============================
1+
API2:2019 Broken User Authentication
2+
====================================
33

44
| Threat agents/Attack vectors | Security Weakness | Impacts |
55
| - | - | - |
@@ -24,8 +24,6 @@ An API is vulnerable if it:
2424
* Accepts unsigned / weakly signed JWT tokens (`"alg":"none"`) / doesn’t
2525
validate their expiration date.
2626
* Uses plain text, encrypted, or weakly hashed passwords.
27-
* Uses weak encryption keys / API keys.
28-
2927

3028
## Example Attack Scenarios
3129

0 commit comments

Comments
 (0)