Category: OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management

Obsolete
Summary

Weaknesses in this category are related to the A3 category in the OWASP Top Ten 2004.

Membership
IDNameDescription
CWE-259Use of Hard-coded PasswordThis vulnerability occurs when an application embeds a password directly into its source code or configuration files. This hard-coded secret is then used either to authenticate incoming users or to connect to external services and databases.
CWE-287Improper AuthenticationImproper Authentication occurs when a system fails to properly verify a user's claimed identity, allowing access without sufficient proof of who they are.
CWE-296Improper Following of a Certificate's Chain of TrustThis vulnerability occurs when software fails to properly validate the entire certificate chain back to a trusted root authority. This mistake can cause the system to incorrectly trust a certificate and the resource it represents, creating a security gap.
CWE-298Improper Validation of Certificate ExpirationThis vulnerability occurs when an application fails to properly check if a digital certificate has expired, potentially trusting certificates that are no longer valid due to their age.
CWE-302Authentication Bypass by Assumed-Immutable DataThis vulnerability occurs when an authentication system incorrectly treats certain data as unchangeable, when in fact an attacker can manipulate it to bypass login or verification checks.
CWE-304Missing Critical Step in AuthenticationThis vulnerability occurs when a software authentication process omits a required step, weakening its overall security.
CWE-307Improper Restriction of Excessive Authentication AttemptsThis vulnerability occurs when an application fails to properly limit how many times someone can attempt to log in or verify their identity in rapid succession, allowing attackers to systematically guess credentials.
CWE-309Use of Password System for Primary AuthenticationThis weakness occurs when an application relies solely on password-based authentication as its main security gate. This single-factor approach is inherently vulnerable to a range of attacks that can compromise user accounts.
CWE-345Insufficient Verification of Data AuthenticityThis vulnerability occurs when an application fails to properly check where data comes from or confirm its legitimacy, allowing untrusted or forged information to be processed as valid.
CWE-384Session FixationSession fixation occurs when an application authenticates a user without first destroying the previous session ID. This allows an attacker who knows that session identifier to hijack the user's authenticated session.
CWE-521Weak Password RequirementsThis vulnerability occurs when an application fails to enforce strong password policies, making user accounts easier to compromise through guessing or automated attacks.
CWE-522Insufficiently Protected CredentialsThis vulnerability occurs when an application handles sensitive credentials like passwords or API keys in an insecure way, making them easy for attackers to steal during transmission or while stored.
CWE-525Use of Web Browser Cache Containing Sensitive InformationThis vulnerability occurs when a web application fails to implement secure caching directives, allowing sensitive user data or pages to be stored in the browser's cache where unauthorized parties could retrieve them.
CWE-613Insufficient Session ExpirationInsufficient session expiration occurs when an application allows old session tokens or IDs to remain valid for too long, letting attackers reuse them to gain unauthorized access.
CWE-620Unverified Password ChangeThis vulnerability occurs when an application allows a user to set a new password without first verifying their identity through the old password or a secure secondary authentication method.
CWE-640Weak Password Recovery Mechanism for Forgotten PasswordThis vulnerability occurs when an application's password reset or recovery feature is poorly designed or implemented, allowing attackers to bypass authentication and hijack user accounts.
CWE-798Use of Hard-coded CredentialsThis vulnerability occurs when software contains built-in, unchangeable authentication secrets like passwords or encryption keys within its source code or configuration files.
CWE-711Weaknesses in OWASP Top Ten (2004)CWE entries in this view (graph) are associated with the OWASP Top Ten, as released in 2004, and as required for compliance with PCI DSS version 1.1. This view is considered obsolete as a newer version of the OWASP Top Ten is available.
CWE-255Credentials Management ErrorsWeaknesses in this category are related to the management of credentials.
Vulnerability Mapping Notes
Usage: Prohibited
Reasons: Category
Rationale:
This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.
Comment:
See member weaknesses of this category.