From f0411ef473a5541de81e87bd7298504825fcff0a Mon Sep 17 00:00:00 2001 From: Mike Elissen <61023476+securitylevelup@users.noreply.github.com> Date: Wed, 15 Mar 2023 19:13:18 +0100 Subject: [PATCH] Update 0xa2-broken-authentication.md See https://github.com/OWASP/API-Security/issues/94, updating wording to better reflect all types of APIs that are vulnerable to authentication threats. --- 2023/en/src/0xa2-broken-authentication.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2023/en/src/0xa2-broken-authentication.md b/2023/en/src/0xa2-broken-authentication.md index f6c15eb25..ccc287fc4 100644 --- a/2023/en/src/0xa2-broken-authentication.md +++ b/2023/en/src/0xa2-broken-authentication.md @@ -11,7 +11,7 @@ API2:2023 Broken Authentication Authentication endpoints and flows are assets that need to be protected. Additionally, "Forgot password / reset password" should be treated the same way as authentication mechanisms. -A public-facing API is vulnerable if it: +An API is vulnerable if it: * Permits credential stuffing where the attacker uses brute force with a list of valid usernames and passwords.