Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
It is imperative that an application perform checks when each function or portion of the application is accessed, to ensure that the user is properly authorized to access it.
Without continual checks each time a function is accessed, an attacker could forge requests to access portions of the application where authorization has not been granted.
The correct answer is B. Missing function-level access control.
Missing function-level access control is a type of vulnerability that occurs when an application fails to properly enforce restrictions on what authenticated users are allowed to do. In other words, it allows users to perform unauthorized actions by exploiting the lack of proper authorization checks on specific functions or features within the application. This can lead to sensitive data exposure, unauthorized data modifications, and a host of other security risks.
For example, let's say a user logs into an online banking application with valid credentials. Once authenticated, the user should only be able to perform authorized actions, such as viewing their account balance or transferring money between their own accounts. However, if the application is vulnerable to missing function-level access control, the user may be able to perform unauthorized actions, such as transferring funds to another user's account or viewing another user's account information.
On the other hand, the other answer choices listed are also common web application vulnerabilities:
It is important for web developers and security professionals to be aware of all these types of vulnerabilities and implement appropriate measures to mitigate them.