Skip to content

Commit c670c9e

Browse files
authored
Publish Latest 2025-01-10 (#440)
Updates based on OWASP/wstg@580d02b
1 parent 1384b00 commit c670c9e

File tree

3 files changed

+9
-1
lines changed

3 files changed

+9
-1
lines changed

latest/1-Frontispiece/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ This document is released under the [Creative Commons 4.0 License](https://creat
7070
- Asharaf Ali
7171
- Elie Saad
7272
- Eoin Murphy
73+
- Evan Read (alp1n3-eth)
7374
- Francisco Bustos
7475
- frozensolid
7576
- Hsiang-Chih Hsu

latest/1-Frontispiece/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ This document is released under the [Creative Commons 4.0 License](https://creat
7070
- Asharaf Ali
7171
- Elie Saad
7272
- Eoin Murphy
73+
- Evan Read (alp1n3-eth)
7374
- Francisco Bustos
7475
- frozensolid
7576
- Hsiang-Chih Hsu

latest/4-Web_Application_Security_Testing/04-Authentication_Testing/09-Testing_for_Weak_Password_Change_or_Reset_Functionalities.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,9 +172,15 @@ Rather than sending them a link or new password, security questions can be used
172172

173173
See the [Testing for Weak Security Questions](08-Testing_for_Weak_Security_Question_Answer.md) guide for further information.
174174

175+
### Authenticated Identity and Configuration Changes
176+
177+
If the application supports the ability to modify an account's primary identifier (such as an email address or phone number) that is utilized in the password change and reset functionalities the user should be forced to re-authenticate. When the primary identifier used in the password change functionality is able to be modified without re-authentication it allows the re-authentication in the password change functionality to be bypassed. Overall, anything that impacts the security of the account (email, MFA, backup settings, etc.) should require re-authentication before it can be modified.
178+
179+
For example: An application has a password reset flow that sends a reset link to the account's email address. The application also requires re-authentication if the password is attempted to be changed from the perspective of an authenticated user. If an attacker gains access to the account (via a stolen cookie, physical access to the computer, etc.) and changes the account's email address without needing to re-authenticate, then the password reset flow can be used to change the password, bypassing the authenticated password change flow.
180+
175181
### Authenticated Password Changes
176182

177-
Once the user has proved their identity (either through a password reset link, a recovery code, or by logging in on the application) they should be able to change their password. The key area to test are:
183+
Once the user has proved their identity (either through a password reset link, a recovery code, or by logging in on the application) they should be able to change their password. The key areas to test are:
178184

179185
- When setting the password, can you specify the user ID?
180186

0 commit comments

Comments
 (0)