Description
What is Broken Authentication
Broken authentication is an umbrella term for several vulnerabilities that attackers exploit to impersonate
legitimate users online. Broadly, broken authentication refers to weaknesses in two areas: session management
and credential management. Both are classified as broken authentication because attackers can use either
avenue to masquerade as a user: hijacked session IDs or stolen login credentials.
Broken Authentication errors occur when:
- Permits automated attacks such as credential stuffing, where the attacker has a list of valid usernames and passwords.
- Permits brute force or other automated attacks.
- Permits default, weak, or well-known passwords, such as “Password1” or “admin/admin“.
- Uses weak or ineffective credential recovery and forgot-password processes, such as “knowledge-based answers”, which cannot be made safe.
- Uses plain text, encrypted, or weakly hashed passwords.
- Has missing or ineffective multi-factor authentication.
- Exposes Session IDs in the URL (e.g., URL rewriting).
- Does not rotate Session IDs after successful login.
- Does not properly invalidate Session IDs. User sessions or authentication tokens (particularly single sign-on (SSO) tokens) aren’t properly invalidated during logout or a period of inactivity.
The main consequences are:
- Unauthorized users can acess the system.
- User information is leaked
Mitigation
Try thinking about cookies and how they can expose secrets !!!!