Details
Alert ID 10105-1
Alert Type Passive
Status release
Risk Medium
CWE 287
WASC 1
Technologies Targeted All
Tags CWE-287
OWASP_2017_A02
OWASP_2017_A03
OWASP_2021_A01
OWASP_2021_A02
WSTG-V42-ATHN-01
More Info Scan Rule Help

Summary

An insecure authentication mechanism is in use. This allows an attacker on the network access to the userid and password of the authenticated user. For Basic Authentication, the attacker must merely monitor the network traffic until a Basic Authentication request is received, and then base64 decode the username and password. For Digest Authentication, the attacker has access to the username, and possibly also the password, if the hash (including a nonce) can be successfully cracked, or if a Man-In-The-Middle attack is mounted. The attacker eavesdrops on the network until an authentication has completed.

Solution

Use HTTPS, and use a secure authentication mechanism that does not transmit the userid or password in an un-encrypted fashion. In particular, avoid use of the Basic Authentication mechanism, since this trivial obfuscation mechanism is easily broken.

Other Info

[POST] [http://www.example.com] uses insecure authentication mechanism [Digest], revealing username [admin] and additional information [username="admin", realm="members only"].

References

Code

org/zaproxy/zap/extension/pscanrules/InsecureAuthenticationScanRule.java