OWASP Broken Authentication and Session Management Example
Join the DZone community and get the full member experience.Join For Free
the article presents an example on one of the top owasp vulnerability related with authentication and session management. this is termed as “broken authentication and session management”. to know more about this vulnerability and related details, visit owasp page for broken authentication and session management .
i was surfing a website, http://www.99acres.com , few days back and tried to retrieve my password using “ forgot password ” page. as i entered my username, i was amazed to see my email address shown there. i, then, tried another name such as “karthik” and following was the message: “an email has been sent to email@example.com . please click on the link provided in the email to create a new password.” take a look at the screenshot below as an evidence of the vulnerability .
as 99acres.com is one of the india’s largest retail website, one could easily write an automated script and retrieve email addresses of millions of users and then, use different techniques to retrieve few passwords as well.
the solution is pretty simple. the response message could look like following:
“an email has been sent to your registered email address. please click on the link provided in the email to create a new password.”
Published at DZone with permission of Ajitesh Kumar, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.