-
Authorization
-
Credential / Session Prediction
- is a method of hijacking or impersonating a user.
-
Insufficient Authorization
- permits access to sensitive content or functionality that should require more access control restrictions.
-
Insufficient Session Expiration
- permits an attacker to reuse old session credentials or session IDs for authorization.
-
Session Fixation
- attacks force a user’s session ID to an explicit value.
-
Authentication
-
Brute Force
- attack automates a process of trial and error to guess a person’s username, password, credit-card number or cryptographic key.
-
Insufficient Authentication
- permits an attacker to access sensitive content or functionality without proper authentication
-
Weak Password Recovery Validation
- permits an attacker to illegally obtain, change or recover another user’s password.
-
Information Disclosure
-
Directory Indexing
- is an automatic directory listing / indexing web server function that shows all files in a requested directory if the normal base file is not present.
-
Information Leakage
- occurs when a web site reveals sensitive data such as developer comments or error messages, which may aid an attacker in exploiting the system.
-
Path Traversal
- forces access to files, directories and commands that potentially reside outside the web document root directory
-
Predictable Resource Location
- uncovers hidden web site content and functionality.
-
Command Execution
-
Buffer Overflow
- attacks alter the flow of an application by overwriting parts of memory
-
Format String Attack
- alters the flow of an application by using string formatting library features to access other memory space.
-
LDAP Injection
- attacks exploit web sites by constructing LDAP statements from user-supplied input.
-
OS Commanding
- executes operating system commands on a web site by manipulating application input.
-
SQL Injection
- constructs illegal SQL statements on a web site application from user-supplied input
-
SSI Injection
- (also called Server-side Include) sends code into a web application, which is later executed locally by the web server.
-
XPath Injection
- constructs XPath queries from user-supplied input
-
Client-side Attacks
-
Content Spoofing
- tricks a user into believing that certain content appearing on a web site is legitimate and not from an external source.
-
Cross-site Scripting
- (XSS) forces a web site to echo attacker-supplied executable code, which loads into a user’s browser.
-
Logical Attacks
-
Abuse of Functionality
- uses a web site’s own features and functionality to consume, defraud or circumvent access control mechanisms.
-
Denial of Service
- (DoS) attacks prevent a web site from serving normal user activity.
-
Insufficient Anti-automation
- is when a web site permits an attacker to automate a process that should only be performed manually.
-
Insufficient Process Validation
- permits an attacker to bypass or circumvent the intended flow of an application.