Proper authentication responses
Summary
System responses to authentication failures must not indicate which part of the authentication was incorrect.
Description
Authentication forms are one of the most publicly accessible parts of an application, which makes them more susceptible to be attacked. Most authentication mechanisms require only a username and a password. If the responses to authentication attempts indicate which authentication parameter was incorrect, attackers may be able to obtain a list of valid usernames (user enumeration) that they can use in brute force attacks.
References
- CWE-203. Observable discrepancy
- PDPO-S1_5. Information to be generally available
- CMMC-AC_L2-3_1_8. Unsuccessful logon attempts
- CMMC-AC_L2-3_1_9. Privacy & security notices
- CMMC-AU_L2-3_3_4. Audit failure alerting
- IEC62443-IAC-1_12. System use notification
- WASSEC-6_2_1_1. Authentication - Brute force
- ISSAF-T_19_2. Web application assessment - Global Countermeasures (server-side)
- ISSAF-V_12. Application security - Source code auditing (error handling)
- NIST800171-1_9. Provide privacy and security notices
- NIST800171-5_11. Obscure feedback of authentication information
- OWASPMASVS-AUTH-1. The app uses secure authentication and authorization protocols and follows the relevant best practices
- NIST-PR_AA-03. Users, services, and hardware are authenticated
- NIST-RS_MA-01. The incident response plan is executed in coordination with relevant third parties once an incident is declared
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
Advanced Plan