Skip to content

Commit f918706

Browse files
committed
refactor: rename A1:2019 Broken Object Level Access Control
Category was renamed "Missing Object Level Access Control"
1 parent b056d8e commit f918706

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

2019/en/src/0x00-toc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Table of Contents
88
* [Release Notes](0x04-release-notes.md)
99
* [API Security Risks](0x10-api-security-risks.md)
1010
* [OWASP Top 10 API Security Risks – 2019](0x11-t10.md)
11-
* [A1:2019 Broken Object Level Access Control](0xa1-broken-object-level-access-control.md)
11+
* [A1:2019 Missing Object Level Access Control](0xa1-missing-object-level-access-control.md)
1212
* [A2:2019 Broken Authentication](0xa2-broken-authentication.md)
1313
* [A3:2019 Improper Data Filtering](0xa3-improper-data-filtering.md)
1414
* [A4:2019 Lack of Resources & Rate Limiting](0xa4-lack-of-resources-and-rate-limiting.md)

2019/en/src/0x11-t10.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ OWASP Top 10 API Security Risks – 2019
33

44
| Risk | Description |
55
| ---- | ----------- |
6-
| A1:2019 - Broken Object Level Access Control | APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be taken in mind in every function that accesses a data source using an input from the user. |
6+
| A1:2019 - Missing Object Level Access Control | APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object level authorization checks should be taken in mind in every function that accesses a data source using an input from the user. |
77
| A2:2019 - Broken Authentication | Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user's identities temporarily or permanently. Compromising system's ability to identify the client/user, compromises API overall security. |
88
| A3:2019 - Improper Data Filtering | Looking forward to generic implementations developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before showing it to the user. Without controlling client's state, servers receive more and more filters which can be abused to gain access to sensitive data. |
99
| A4:2019 - Lack of Resources & Rate Limiting | Quite often APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only this can impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force. |

2019/en/src/0xa1-broken-object-level-access-control.md renamed to 2019/en/src/0xa1-missing-object-level-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
A1:2019 Broken Object Level Access Control
2-
==========================================
1+
A1:2019 Missing Object Level Access Control
2+
===========================================
33

44
| Threat agents/Attack vectors | Security Weakness | Impacts |
55
| - | - | - |

0 commit comments

Comments
 (0)