Skip to content

Commit

Permalink
Update document/4-Web_Application_Security_Testing/04-Authentication_…
Browse files Browse the repository at this point in the history
…Testing/09-Testing_for_Weak_Password_Change_or_Reset_Functionalities.md
  • Loading branch information
kingthorin authored Jan 10, 2025
1 parent 4649da5 commit 8601e4f
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -165,7 +165,7 @@ See the [Testing for Weak Security Questions](08-Testing_for_Weak_Security_Quest

### Authenticated Identity and Configuration Changes

If the application supports the ability to modify an account's primary identifier (such as an email address or phone number) that is utilized in the password change and reset functionalities the user should be forced to re-authenticate. When the primary identifier used in the password change functionality is able to be modified without re-authentication it allows the re-authentication in the password change functionality to be bypassed. Overall, anything that impacts the security of the account (email, MFA, backup settings, etc.) should require re-authentication before it can be modified.
If the application supports the ability to modify an account's primary identifier (such as an email address or phone number) that is utilized in the password change and reset functionalities the user should be forced to re-authenticate. When the primary identifier used in the password change functionality is able to be modified without re-authentication it allows the re-authentication in the password change functionality to be bypassed. Overall, anything that impacts the security of the account (email, MFA, backup settings, etc.) should require re-authentication before it can be modified.

For example: An application has a password reset flow that sends a reset link to the account's email address. The application also requires re-authentication if the password is attempted to be changed from the perspective of an authenticated user. If an attacker gains access to the account (via a stolen cookie, physical access to the computer, etc.) and changes the account's email address without needing to re-authenticate, then the password reset flow can be used to change the password, bypassing the authenticated password change flow.

Expand Down

0 comments on commit 8601e4f

Please sign in to comment.