General Information

Authentication Bypass via Forced Access

Variants:
Direct 

Also Known As:
Improper Authentication, Authentication Abuse

Vector Type:
Attack

Relevance:
Generic

Layer:
Application-Level

Platforms:
Any

Target Type:
Application

Affected Mechanisms:
Authentication Enforcement

Invented In:
01/01/1999

Added In:
24/12/2014

Quick Introduction to the Topic:


Vector Operation Method:
Attackers can bypass the authentication enforcement by directly accessing protected resources that require authentication, without undergoing a successful authentication process.


Direct Variant:

Authentication Bypass via Forced Browsing

Variant Title:
Authentication Bypass via Forced Browsing

Typical Severity:
Major

Learn More: