<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Germany%2FProjekte%2FTop_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene</id>
		<title>Germany/Projekte/Top 10-2013-A7-Fehlerhafte Autorisierung auf Anwendungsebene - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=Germany%2FProjekte%2FTop_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;action=history"/>
		<updated>2026-05-05T04:28:16Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;diff=229042&amp;oldid=prev</id>
		<title>T.Gigler: doppeltes '|language=de' gelöscht</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;diff=229042&amp;oldid=prev"/>
				<updated>2017-04-23T20:00:39Z</updated>
		
		<summary type="html">&lt;p&gt;doppeltes &amp;#039;|language=de&amp;#039; gelöscht&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 20:00, 23 April 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l15&quot; &gt;Line 15:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 15:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderBeginTemplate|type=images|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; {{Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=2&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;|language=de&lt;/del&gt;|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; {{Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=2|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&amp;#160; &amp;#160;  &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160;&amp;#160; &amp;#160;  &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>T.Gigler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;diff=153881&amp;oldid=prev</id>
		<title>T.Gigler: Top_10_2010:SummaryTableHeaderBeginTemplate|type=images =&gt; mit Bildern</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;diff=153881&amp;oldid=prev"/>
				<updated>2013-06-15T22:29:48Z</updated>
		
		<summary type="html">&lt;p&gt;Top_10_2010:SummaryTableHeaderBeginTemplate|type=images =&amp;gt; mit Bildern&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 22:29, 15 June 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l14&quot; &gt;Line 14:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 14:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderBeginTemplate&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;|type=images&lt;/ins&gt;|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; {{Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=2|language=de|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; {{Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=2|language=de|year=2013|language=de}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>T.Gigler</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;diff=153855&amp;oldid=prev</id>
		<title>T.Gigler: Import vom engl. Wiki, mit language=de</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Germany/Projekte/Top_10-2013-A7-Fehlerhafte_Autorisierung_auf_Anwendungsebene&amp;diff=153855&amp;oldid=prev"/>
				<updated>2013-06-15T18:20:34Z</updated>
		
		<summary type="html">&lt;p&gt;Import vom engl. Wiki, mit language=de&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A8-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |8&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A6-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |6&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |year=2013&lt;br /&gt;
    |language=de&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2013|language=de}}&lt;br /&gt;
 {{Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=2|language=de|year=2013|language=de}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2013}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Anyone with network access can send your application a request. Could anonymous users access private functionality or regular users a privileged function? &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Attacker, who is an authorized system user, simply changes the URL or a parameter to a privileged function. Is access granted? Anonymous users could access private functions that aren’t protected.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Applications do not always protect application functions properly. Sometimes, function level protection is managed via configuration, and the system is misconfigured. Sometimes, developers must include the proper code checks, and they forget.&lt;br /&gt;
&lt;br /&gt;
Detecting such flaws is easy. The hardest part is identifying which pages (URLs) or functions exist to attack.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Such flaws allow attackers to access unauthorized functionality. Administrative functions are key targets for this type of attack.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;&lt;br /&gt;
Cbusiness value of the exposed functions and the data they process.&lt;br /&gt;
&lt;br /&gt;
Also consider the impact to your reputation if this vulnerability became onsider the public.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=7|year=2013|language=de}}&lt;br /&gt;
The best way to find out if an application has failed to properly restrict function level access is to verify every application function:&lt;br /&gt;
# Does the UI show navigation to unauthorized functions?&lt;br /&gt;
# Are  server side authentication or authorization checks missing?&lt;br /&gt;
# Are server side checks done that solely rely on information provided by the attacker?&lt;br /&gt;
&lt;br /&gt;
Using a proxy, browse your application with a privileged role. Then revisit restricted pages using a less privileged role. If the server responses are alike, you're probably vulnerable. Some testing proxies directly support this type of analysis.&lt;br /&gt;
&lt;br /&gt;
You can also check the access control implementation in the code. Try following a single privileged request through the code and verifying the authorization pattern. Then search the codebase to find where that pattern is not being followed.&lt;br /&gt;
&lt;br /&gt;
Automated tools are unlikely to find these problems.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=7|year=2013|language=de}}&lt;br /&gt;
Your application should have a consistent and easy to analyze authorization module that is invoked from all of your business functions.  Frequently, such protection is provided by one or more components external to the application code. &lt;br /&gt;
# Think about the process for managing entitlements and ensure you can update and audit easily. Don’t hard code.&lt;br /&gt;
# The enforcement mechanism(s) should deny all access by default, requiring explicit grants to specific roles for access to every function.&lt;br /&gt;
# If the function is involved in a workflow, check to make sure the conditions are in the proper state to allow access.&lt;br /&gt;
&lt;br /&gt;
NOTE: Most web applications don’t display links and buttons to unauthorized functions, but this “presentation layer access control” doesn’t actually provide protection. You must &amp;lt;u&amp;gt;also&amp;lt;/u&amp;gt; implement checks in the controller or business logic.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=7|year=2013|language=de}}&lt;br /&gt;
'''Scenario #1:''' The attacker simply force browses to target URLs. The following URLs require authentication. Admin rights are also required for access to the &amp;lt;u&amp;gt;admin_getappInfo&amp;lt;/u&amp;gt; page.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2013}}&amp;lt;nowiki&amp;gt;&lt;br /&gt;
http://example.com/app/getappInfo&lt;br /&gt;
http://example.com/app/admin_getappInfo&lt;br /&gt;
&amp;lt;/nowiki&amp;gt; {{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
If an unauthenticated user can  access either page, that’s a flaw. If an authenticated, non-admin, user is allowed to access the &amp;lt;u&amp;gt;admin_getappInfo&amp;lt;/u&amp;gt; page, this is also a flaw, and may lead the attacker to more improperly protected admin pages.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #2:''' A page provides an 'action' parameter to specify the function being invoked, and different actions require different roles. If these roles aren’t enforced, that’s a flaw.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=7|year=2013|language=de}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/Top_10_2007-Failure_to_Restrict_URL_Access  OWASP Top 10-2007 on Failure to Restrict URL Access]&lt;br /&gt;
* [http://owasp-esapi-java.googlecode.com/svn/trunk_doc/latest/org/owasp/esapi/AccessController.html  ESAPI Access Control API]&lt;br /&gt;
* [https://www.owasp.org/index.php/Guide_to_Authorization  OWASP Development Guide: Chapter on Authorization]&lt;br /&gt;
* [https://www.owasp.org/index.php/Testing_for_Path_Traversal  OWASP Testing Guide: Testing for Path Traversal]&lt;br /&gt;
* [https://www.owasp.org/index.php/Forced_browsing  OWASP Article on Forced Browsing]&lt;br /&gt;
&lt;br /&gt;
For additional access control requirements, see the [https://www.owasp.org/index.php/ASVS  ASVS requirements area for Access Control (V4)].&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate|language=de}}&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/285.html  CWE Entry 285 on Improper Access Control (Authorization)]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomAdvancedTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A8-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |8&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A6-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |6&lt;br /&gt;
              |year=2013&lt;br /&gt;
              |language=de}}&lt;br /&gt;
    |year=2013&lt;br /&gt;
    |language=de&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>T.Gigler</name></author>	</entry>

	</feed>