AUTHORIZATION (AZK)

Ryan can influence or alter authorization controls and permissions, and can therefore bypass them

AUTHORIZATION
K

Ryan can influence or alter authorization controls and permissions, and can therefore bypass them

OWASP SCP

77,89,91

OWASP ASVS

4.1.1,4.1.2,10.2.3,10.2.4,10.2.5,10.2.6

OWASP AppSensor

CAPEC

-

SAFECODE

8,10,11

How to play?

Use only trusted system objects, e.g. server side session objects, for making access authorization decisions. Restrict access to user and data attributes and policy information used by access controls. Server side implementation and presentation layer representations of access control rules must match.

Mappings

OWASP ASVS (4.0): 4.1.1 ,4.1.2 ,10.2.3 ,10.2.4 ,10.2.5 ,10.2.6

Capec: 207 ,554

OWASP SCP: 77,89,91

OWASP Appsensor:

Safecode: 8,10,11

ASVS (4.0) Cheatsheetseries Index

ASVS V4.1 - General Access Control Design

ASVS V10.2 - Malicious Code Search

No suitable mappings were found.

Attacks

(Session) Data tampering

Privilege escalation

Insider Threats

Session Hijacking (Man-in-the-Middle)

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.