Skip to content

Commit ea77cba

Browse files
committed
fix: Fix the url
1 parent 6b4e9a7 commit ea77cba

File tree

3 files changed

+7
-6
lines changed

3 files changed

+7
-6
lines changed

editions/2023/en/0x11-t10.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@
1313
| [API9:2023 - Improper Inventory Management][api9] | APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. A proper inventory of hosts and deployed API versions also are important to mitigate issues such as deprecated API versions and exposed debug endpoints. |
1414
| [API10:2023 - Unsafe Consumption of APIs][api10] | Developers tend to trust data received from third-party APIs more than user input, and so tend to adopt weaker security standards. In order to compromise APIs, attackers go after integrated third-party services instead of trying to compromise the target API directly. |
1515

16-
[1]: https://github.com/OWASP/API-Security/blob/master/editions/2019/en/0xa3-excessive-data-exposure.md
17-
[2]: https://github.com/OWASP/API-Security/blob/master/editions/2019/en/0xa6-mass-assignment.md
18-
[3]: https://github.com/OWASP/API-Security/blob/master/editions/2019/en/0xa4-lack-of-resources-and-rate-limiting.md
16+
[1]: https://owasp.org/API-Security/editions/2019/en/0xa3-excessive-data-exposure/
17+
[2]: https://owasp.org/API-Security/editions/2019/en/0xa6-mass-assignment/
18+
[3]: https://owasp.org/API-Security/editions/2019/en/0xa4-lack-of-resources-and-rate-limiting/
1919
[api1]: 0xa1-broken-object-level-authorization.md
2020
[api2]: 0xa2-broken-authentication.md
2121
[api3]: 0xa3-broken-object-property-level-authorization.md

editions/2023/en/0xa3-broken-object-property-level-authorization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,8 +144,8 @@ content.
144144
* [CWE-213: Exposure of Sensitive Information Due to Incompatible Policies][4]
145145
* [CWE-915: Improperly Controlled Modification of Dynamically-Determined Object Attributes][5]
146146

147-
[1]: https://github.com/OWASP/API-Security/blob/master/editions/2019/en/0xa3-excessive-data-exposure.md
148-
[2]: https://github.com/OWASP/API-Security/blob/master/editions/2019/en/0xa6-mass-assignment.md
147+
[1]: https://owasp.org/API-Security/editions/2019/en/0xa3-excessive-data-exposure/
148+
[2]: https://owasp.org/API-Security/editions/2019/en/0xa6-mass-assignment/
149149
[3]: https://cheatsheetseries.owasp.org/cheatsheets/Mass_Assignment_Cheat_Sheet.html
150150
[4]: https://cwe.mitre.org/data/definitions/213.html
151151
[5]: https://cwe.mitre.org/data/definitions/915.html

editions/2023/en/0xa6-unrestricted-access-to-sensitive-business-flows.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,4 +103,5 @@ The mitigation planning should be done in two layers:
103103
* [API10:2019 Insufficient Logging & Monitoring][2]
104104

105105
[1]: https://owasp.org/www-project-automated-threats-to-web-applications/
106-
[2]: https://github.com/OWASP/API-Security/blob/master/editions/2019/en/0xaa-insufficient-logging-monitoring.md
106+
[2]: https://owasp.org/API-Security/editions/2019/en/0xaa-insufficient-logging-monitoring/
107+

0 commit comments

Comments
 (0)