AUTHENTICATION (AT8)

Kate can bypass authentication because it does not fail secure (i.e. it defaults to allowing unauthenticated access)

AUTHENTICATION
8

Kate can bypass authentication because it does not fail secure (i.e. it defaults to allowing unauthenticated access)

OWASP SCP

28

OWASP ASVS

4.1.5

OWASP AppSensor

CAPEC

-

SAFECODE

28

How to play?

Once an authentication failure is detected, access needs to be blocked. It is also useful to log (associated with the user's identity if possible) and flag these as possibly malicious activity for further analysis, or as input for application intrusion detection systems.

NB: the key concept for this card is permitting access, even though authentication checks were undertaken and detected a failure. See AT 4 for the similar authorization failure.

Mappings

OWASP ASVS (4.0): 4.1.5

Capec: 115

OWASP SCP: 28

OWASP Appsensor:

Safecode: 28

ASVS (4.0) Cheatsheetseries Index

ASVS V4.1 - General Access Control Design

No suitable mappings were found.

Attacks

SQL Injection

Cross-Site Scripting (XSS)

(Session) Data tampering

Privilege escalation

Password Guessing/Brute Force Attacks

Account Takeover (ATO) Attacks

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.