AUTHORIZATION (AZ3)

Christian can access information, which he should not have permission to, through another mechanism that does have permission (e.g. search indexer, logger, reporting), or because it is cached, or kept for longer than necessary, or through other information leakage

AUTHORIZATION
3

Christian can access information, which he should not have permission to, through another mechanism that does have permission (e.g. search indexer, logger, reporting), or because it is cached, or kept for longer than necessary, or through other information leakage

OWASP SCP

51,100,135,139,140,141,150

OWASP ASVS

4.1.3,4.1.5,8.1.2,8.2.1,8.3.1,8.3.4,8.3.6,8.3.8,12.4.1

OWASP AppSensor

CAPEC

-

SAFECODE

8,10,11

How to play?

The attacker themselves is not permitted direct access, but has access to something, that had or has access to information. Consider all accounts/roles and what access privileges they have, and whether a user in one role can utilise another role. Create an Access Control Policy to document an application's business rules, data types and access authorization criteria and/or processes so that access can be properly provisioned and controlled. This includes identifying access requirements for both the data and system resources.

This card also includes considerations of access to residual information such as cached data, data stored temporarily, and the inadequate deletion of information that is no longer required (and has passed its required retention period).

Mappings

OWASP ASVS (4.0): 4.1.3 ,4.1.5 ,8.1.2 ,8.2.1 ,8.3.1 ,8.3.4 ,8.3.6 ,8.3.8 ,12.4.1

Capec: 69 ,213

OWASP SCP: 51,100,135,139,140,141,150

OWASP Appsensor:

Safecode: 8,10,11

ASVS (4.0) Cheatsheetseries Index

ASVS V4.1 - General Access Control Design

ASVS V8.1 - General Data Protection

ASVS V8.2 - Client-side Data Protection

ASVS V8.3 - Sensitive Private Data

ASVS V12.4 - File Storage Requirements

No suitable mappings were found.

Attacks

(Session) Data tampering

Password Guessing/Brute Force Attacks

Social engineering attack

Session Hijacking (Man-in-the-Middle)

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.