This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "URL Level Access Control Cheat Sheet"
From OWASP
Line 33: | Line 33: | ||
*In Some Code | *In Some Code | ||
− | + | (code*)here | |
− | *In | + | *In Some other code |
(code*)here | (code*)here |
Revision as of 16:29, 30 January 2013
- 1 DRAFT CHEAT SHEET - WORK IN PROGRESS
- 2 Introduction
- 3 Attacks on URL Level Access Control
- 4 URL Level Access Control Issues
- 5 Access Control Anti-Patterns
- 6 Attacking Access Controls
- 7 Testing for Broken URL Level Access Control
- 8 Defenses Against URL Level Access Control Attacks
- 9 Best Practices
- 10 SQL Integrated Access Control
- 11 Related Articles
DRAFT CHEAT SHEET - WORK IN PROGRESS
Introduction
This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.
What is URL Level Access Control?
Attacks on URL Level Access Control
URL Level Access Control Issues
Access Control Anti-Patterns
Order Specific Operations
Never Depend on Untrusted Data
Attacking Access Controls
Testing for Broken URL Level Access Control
Defenses Against URL Level Access Control Attacks
Best Practices
Best Practice: Code to the Activity
Best Practice: SOMETHING
Best Practice: SOMETHING ELSE
- In Some Code
(code*)here
- In Some other code
(code*)here
Best Practice: Verifying policy server-side
SQL Integrated Access Control
Examples
Related Articles
OWASP Cheat Sheets Project Homepage