You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: 2023/en/src/0xa2-broken-authentication.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,8 @@ API2:2023 Broken Authentication
8
8
9
9
## Is the API Vulnerable?
10
10
11
-
Authentication endpoints and flows are assets that need to be protected. Additionally, "Forgot password / reset password" should be treated the same way
11
+
Authentication endpoints and flows are assets that need to be protected.
12
+
Additionally, "Forgot password / reset password" should be treated the same way
12
13
as authentication mechanisms.
13
14
14
15
An API is vulnerable if it:
@@ -82,11 +83,11 @@ Authorization: Bearer <token>
82
83
{ "email": "<new_email_address>" }
83
84
```
84
85
85
-
Because the API does not require the user to confirm their identity by
86
-
providing their current password, bad actors are able to put themselves in a
87
-
position to steal the auth token.They also might be able to take over the
88
-
victim's account by starting the reset password workflow after updating the
89
-
email address of the victim's account.
86
+
Because the API does not require users to confirm their identity by providing
87
+
their current password, bad actors able to put themselves in a position to
88
+
steal the auth tokenmight be able to take over the victim's account by starting
89
+
the reset password workflow after updating the email address of the victim's
0 commit comments