Cesspit - Authentication - Jack or Queen

A cesspit with an open iron gate.

Image: A cesspit with an open iron gate.

You jump into the cesspit holding your nose as you swim towards the gate. As you reach the gate you notice that the gate has no lock. It was probably mistakingly assumed that no lock would be necessary as the feeces and excrements in the cesspit would deter anyone from jumping in and swimming across. Since the gate is unlocked you force it open and enter into the lower part of the castle dungeon.

Note:

The key concept is inconsistent or missing authentication.

For each entry point, check and test that the correct degree of authentication is required and occurs. Ensure this includes:

  • Access to remote systems.
  • APIs.
  • Non HTML content (e.g. files, images).
  • Reporting.
  • Any other 'internal' functionality.

The degree of identity assurance may not be the same for all web application functions. Or the authentication function may be available in a weaker manner in some other mode or channel, thus compromising the web application.

You may mistakingly assume that no authentication is necessary due to the fact that the functionality is hidden, inaccessible or in this case, protected by a stinking cesspit, but a good hacker always find his way around these type of barriers.

Provided by Johan Sydseter

OWASP® Dungeons & Daemons

OWASP Dungeons & Daemons is originally created by Johan Sydseter. It is open source and can be downloaded free of charge from the OWASP website. It is is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 4.0 International, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. OWASP does not endorse or recommend commercial products or services. OWASP Dungeons & Daemons is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license and is © 2024 OWASP Foundation.