Categories: OWASP - Top 10

OWASP A2 – Broken Authentication and Session Management

Broken Authentication and Session Management vulnerability allow’s attackers either to capture or bypass the authentication methods that are used by a web application. Impact would be severe as attacker can able to login account as normal user.

When visiting a website to access your information, you need to log in. To get past this point, you need to provide the
correct Username and Password values.Once you submit this information, a unique value called the Session ID is generated, which is linked to your credentials to keep track of you while you are logged into the application. This value is usually a string of random letters and numbers as seen at the bottom of the slide.

Possible ways of webapplication failure

  • Unencrypted connections.
  • Encourage users to have strong passwords.
  • Expire sessions Quickly.
  • Implement login rate limiting,lockout’s and Hashing passwords.
  • Session ID’S used in the URL.

Unencrypted connections:

If the connection being used between you and the web application is not encrypted, anybody can see the data being
transmitted.This means that ALL INFORMATION that you are sending and receiving between you and the site can be intercepted without your knowledge.

Fails to protect the user name,password, sensitive details and session ID’s.

By enabling encryption on requests that contain sensitive data can prevent this information from being intercepted by attackers.

Encourage users to have strong passwords

Weak username and passwords are easily guessed by attackers to get unauthorized access.

We can prevent the weakness by enforcing users to have strong passwords.

Expire sessions Quickly

Application does not discard session after certain amount of time or even after logging out.

Invalidate the session ID after pre-determined time or upon logout.

Implement login rate limiting,lockout’s and Hashing passwords

If stored passwords are stolen by unauthorized individual, if no protection is given and values would be visible in plain text.

To prevent weakness stored password should be salted and hashed in addition to encryption.

Session ID Used in URL

Session ID value is transmitted in the URL where attacker can see that, which fails to protect session ID value.

To prevent the weakness Make sure the sensitive information is sent in the body part of the post request.

Let's take a look at the example URL:

http://192.168.242.137/login.jsp?sessionid=abc12345df

Along with this we conclude our coverage with A2-Broken Authentication and Session Management.

Also Read:

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…

1 hour ago

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…

4 hours ago

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…

4 hours ago

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…

6 hours ago

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…

6 hours ago

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series…

7 hours ago