Created
April 15, 2025 16:45
-
-
Save Himan10/98474612ad796faf756bf1db810daf82 to your computer and use it in GitHub Desktop.
akto test template
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
id: REMOVE_TOKENS | |
info: | |
name: "Broken Authentication by removing auth token" | |
description: "API doesn't validate the authenticity of token. Attacker can remove the auth token and access the endpoint." | |
details: > | |
"The endpoint appears to be vulnerable to broken authentication attack. The original request was replayed by removing victim's <b>auth</b> token. The server responded with 2XX success codes.<br>" | |
"<b>Background:</b> Authentication is the process of attempting to verify the digital identity of the sender of a communication. Testing the authentication schema means understanding how the authentication process works and using that information to | |
circumvent the authentication mechanism. While most applications require authentication to gain access to private information or to execute tasks, not every authentication method is able to provide adequate security. Negligence, ignorance, or simple | |
understatement of security threats often result in authentication schemes that can be bypassed by simply skipping the log in page and directly calling an internal page that is supposed to be accessed only after authentication has been performed." | |
impact: "Broken User authentication is a serious vulnerability. Attackers can gain control to other users’ accounts in the system, read their personal data, and perform sensitive actions on their behalf, like money transactions and sending personal messages." | |
category: | |
name: NO_AUTH | |
shortName: Broken Authentication | |
displayName: Broken User Authentication (BUA) | |
subCategory: REMOVE_TOKENS | |
severity: HIGH | |
tags: | |
- Business logic | |
- OWASP top 10 | |
- HackerOne top 10 | |
references: | |
- "https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/" | |
- "https://github.com/OWASP/API-Security/blob/master/editions/2023/en/0xa2-broken-authentication.md" | |
- "https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html" | |
- "https://cwe.mitre.org/data/definitions/798.html" | |
cwe: | |
- CWE-287 | |
- CWE-306 | |
cve: | |
- CVE-2023-22501 | |
attributes: | |
nature: NON_INTRUSIVE | |
plan: FREE | |
duration: FAST | |
api_selection_filters: | |
response_code: | |
gte: 200 | |
lt: 300 | |
response_payload: | |
length: | |
gt: 0 | |
not_contains: | |
- Error | |
- Internal Server | |
- Failed | |
- Unauthorized | |
- access denied | |
- Forbidden | |
- Method Not allowed | |
- Gateway timeout | |
- request timeout | |
- server error | |
- server busy | |
- authentication error | |
- authorization error | |
- validation error | |
- Permission Denied | |
- invalid | |
- token expired | |
- session expired | |
- session timeout | |
- unexpected error | |
- unable to process request | |
- bad request | |
- service unavailable | |
- account is locked | |
- account is blocked | |
- multiple failed attempts | |
method: | |
neq: OPTIONS | |
execute: | |
type: single | |
requests: | |
- req: | |
- remove_auth_header: true | |
validate: | |
response_code: | |
gte: 200 | |
lt: 300 | |
response_payload: | |
length: | |
gt: 0 | |
percentage_match: | |
gte: 80 | |
not_contains: | |
- Error | |
- Internal Server | |
- Failed | |
- Unauthorized | |
- access denied | |
- Forbidden | |
- Method Not allowed | |
- Gateway timeout | |
- request timeout | |
- server error | |
- server busy | |
- authentication error | |
- authorization error | |
- validation error | |
- Permission Denied | |
- invalid token | |
- token expired | |
- session expired | |
- session timeout | |
- unexpected error | |
- unable to process request | |
- bad request | |
- service unavailable | |
- account is locked | |
- account is blocked | |
- multiple failed attempts | |
- invalid credentials |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment