(original) (raw)

{"meta":{"edition":"OWASP Cornucopia Website App Edition","component":"cards","version":"2.1"},"standards":[{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE2","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Brian can gather information about the underlying configurations, schemas, logic, code, software, services and infrastructure due to the content of error messages, or poor configuration, or the presence of default installation files or old, test, backup or copies of resources, or exposure of source code","sectionID":"VE2","hyperlink":"https://cornucopia.owasp.org/cards/VE2","links":\[{"document":{"doctype":"CRE","id":"232-325"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"774-888"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"615-744"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"067-050"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"253-452"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"462-245"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"743-110"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE3","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Robert can input malicious data because the allowed protocol format is not being checked, or duplicates are accepted, or the structure is not being verified, or the individual data elements are not being validated for format, type, range, length and a whitelist of allowed characters or formats","sectionID":"VE3","hyperlink":"https://cornucopia.owasp.org/cards/VE3","links":\[{"document":{"doctype":"CRE","id":"848-711"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"743-237"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"042-550"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"031-447"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"532-878"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"314-131"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"036-725"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE4","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Dave can input malicious field names or data because it is not being checked within the context of the current user and process","sectionID":"VE4","hyperlink":"https://cornucopia.owasp.org/cards/VE4","links":\[{"document":{"doctype":"CRE","id":"304-667"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"743-237"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"042-550"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"534-605"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"456-535"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE5","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Jee can bypass the centralized encoding routines since they are not being used everywhere, or the wrong encodings are being used","sectionID":"VE5","hyperlink":"https://cornucopia.owasp.org/cards/VE5","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"366-835"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"542-445"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"538-446"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"422-005"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE6","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Jason can bypass the centralized validation routines since they are not being used on all inputs","sectionID":"VE6","hyperlink":"https://cornucopia.owasp.org/cards/VE6","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"848-711"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"031-447"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"146-706"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"543-512"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE7","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Jan can craft special payloads to foil input validation because the character set is not specified/enforced, or the data is encoded multiple times, or the data is not fully converted into the same format the application uses (e.g. canonicalization) before being validated, or variables are not strongly typed","sectionID":"VE7","hyperlink":"https://cornucopia.owasp.org/cards/VE7","links":\[{"document":{"doctype":"CRE","id":"848-711"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"146-706"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"543-512"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE8","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Oana can bypass the centralized sanitization routines since they are not being used comprehensively","sectionID":"VE8","hyperlink":"https://cornucopia.owasp.org/cards/VE8","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"538-446"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"422-005"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VE9","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Shamun can bypass input validation or output validation checks because validation failures are not rejected and/or sanitized","sectionID":"VE9","hyperlink":"https://cornucopia.owasp.org/cards/VE9","links":\[{"document":{"doctype":"CRE","id":"184-284"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VEX","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Darío can exploit the trust the application places in a source of data (e.g. user-definable data, manipulation of locally stored data, alteration to state data on a client device, lack of verification of identity during data validation such as Darío can pretend to be Colin)","sectionID":"VEX","hyperlink":"https://cornucopia.owasp.org/cards/VEX","links":\[{"document":{"doctype":"CRE","id":"384-344"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"031-447"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"605-735"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"175-235"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"675-168"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"737-086"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"742-056"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"112-273"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"545-243"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"316-272"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VEJ","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Toby has control over input validation, output validation or output encoding code or routines so they can be bypassed","sectionID":"VEJ","hyperlink":"https://cornucopia.owasp.org/cards/VEJ","links":\[{"document":{"doctype":"CRE","id":"848-711"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VEQ","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Xavier can inject data into a client or device side interpreter because a parameterised interface is not being used, or has not been implemented correctly, or the data has not been encoded correctly for the context, or there is no restrictive policy on code or data includes","sectionID":"VEQ","hyperlink":"https://cornucopia.owasp.org/cards/VEQ","links":\[{"document":{"doctype":"CRE","id":"542-445"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"422-005"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"366-835"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"387-848"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VEK","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"Gabe can inject data into an server-side interpreter (e.g. SQL, OS commands, Xpath, Server JavaScript, SMTP) because a strongly typed parameterised interface is not being used or has not been implemented correctly","sectionID":"VEK","hyperlink":"https://cornucopia.owasp.org/cards/VEK","links":\[{"document":{"doctype":"CRE","id":"542-445"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"538-446"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"732-873"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"531-558"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"857-718"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"547-283"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"134-207"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/VEA","name":"OWASP Cornucopia Website App Edition","section":"DATA VALIDATION & ENCODING","description":"You have invented a new attack against Data Validation and Encoding","sectionID":"VEA","hyperlink":"https://cornucopia.owasp.org/cards/VEA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT2","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"James can undertake authentication functions without the real user ever being aware this has occurred (e.g. attempt to log in, log in with stolen credentials, reset the password) ","sectionID":"AT2","hyperlink":"https://cornucopia.owasp.org/cards/AT2","links":\[{"document":{"doctype":"CRE","id":"772-358"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"240-274"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"555-048"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"841-710"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"473-758"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"617-524"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"046-257"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-304"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT3","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Muhammad can obtain a user's password or other secrets such as security questions, by observation during entry, or from a local cache, or from memory, or in transit, or by reading it from some unprotected location, or because it is widely known, or because it never expires, or because the user cannot change her own password","sectionID":"AT3","hyperlink":"https://cornucopia.owasp.org/cards/AT3","links":\[{"document":{"doctype":"CRE","id":"772-358"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"543-621"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT4","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Sebastien can easily identify user names or can enumerate them","sectionID":"AT4","hyperlink":"https://cornucopia.owasp.org/cards/AT4","links":\[{"document":{"doctype":"CRE","id":"802-056"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"166-151"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT5","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Javier can use default, test or easily guessable credentials to authenticate, or can use an old account or an account not necessary for the application","sectionID":"AT5","hyperlink":"https://cornucopia.owasp.org/cards/AT5","links":\[{"document":{"doctype":"CRE","id":"166-151"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT6","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Sven can reuse a temporary password because the user does not have to change it on first use, or it has too long or no expiry, or it does not use an out-of-band delivery method (e.g. post, mobile app, SMS)","sectionID":"AT6","hyperlink":"https://cornucopia.owasp.org/cards/AT6","links":\[{"document":{"doctype":"CRE","id":"581-525"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT7","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Cecilia can use brute force and dictionary attacks against one or many accounts without limit, or these attacks are simplified due to insufficient complexity, length, expiration and re-use requirements for passwords","sectionID":"AT7","hyperlink":"https://cornucopia.owasp.org/cards/AT7","links":\[{"document":{"doctype":"CRE","id":"158-874"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"576-651"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"338-370"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"802-056"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT8","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Kate can bypass authentication because it does not fail secure (i.e. it defaults to allowing unauthenticated access)","sectionID":"AT8","hyperlink":"https://cornucopia.owasp.org/cards/AT8","links":\[{"document":{"doctype":"CRE","id":"166-151"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AT9","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Claudia can undertake more critical functions because authentication requirements are too weak (e.g. do not use strong authentication such as two factor), or there is no requirement to re-authenticate for these","sectionID":"AT9","hyperlink":"https://cornucopia.owasp.org/cards/AT9","links":\[{"document":{"doctype":"CRE","id":"801-310"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"327-505"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"333-858"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"284-521"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/ATX","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Pravin can bypass authentication controls because a centralized standard, tested, proven and approved authentication module/framework/service, separate to the resource being requested, is not being used","sectionID":"ATX","hyperlink":"https://cornucopia.owasp.org/cards/ATX","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"117-371"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/ATJ","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Mark can access resources or services because there is no authentication requirement, or it was mistakenly assumed authentication would be undertaken by some other system or performed in some previous action","sectionID":"ATJ","hyperlink":"https://cornucopia.owasp.org/cards/ATJ","links":\[{"document":{"doctype":"CRE","id":"801-310"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"201-246"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/ATQ","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Johan can bypass authentication because it is not enforced with equal rigor for all types of authentication functionality (e.g. register, password change, password recovery, log out, administration) or across all versions/channels (e.g. mobile website, mobile app, full website, API, call centre)","sectionID":"ATQ","hyperlink":"https://cornucopia.owasp.org/cards/ATQ","links":\[{"document":{"doctype":"CRE","id":"801-310"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"581-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"358-860"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"201-246"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/ATK","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"Olga can influence or alter authentication code/routines so they can be bypassed","sectionID":"ATK","hyperlink":"https://cornucopia.owasp.org/cards/ATK","links":\[{"document":{"doctype":"CRE","id":"650-560"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"418-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"265-800"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"154-031"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/ATA","name":"OWASP Cornucopia Website App Edition","section":"AUTHENTICATION","description":"You have invented a new attack against Authentication","sectionID":"ATA","hyperlink":"https://cornucopia.owasp.org/cards/ATA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM2","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"William has control over the generation of session identifiers","sectionID":"SM2","hyperlink":"https://cornucopia.owasp.org/cards/SM2","links":\[{"document":{"doctype":"CRE","id":"582-541"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM3","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Ryan can use a single account in parallel since concurrent sessions are allowed","sectionID":"SM3","hyperlink":"https://cornucopia.owasp.org/cards/SM3","links":\[{"document":{"doctype":"CRE","id":"238-346"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"673-736"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM4","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Alison can set session identification cookies on another web application because the domain and path are not restricted sufficiently","sectionID":"SM4","hyperlink":"https://cornucopia.owasp.org/cards/SM4","links":\[{"document":{"doctype":"CRE","id":"688-081"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"804-220"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"342-055"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"232-034"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"705-182"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM5","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"John can predict or guess session identifiers because they are not changed when the user's role alters (e.g. pre and post authentication) and when switching between non-encrypted and encrypted communications, or are not sufficiently long and random, or are not changed periodically","sectionID":"SM5","hyperlink":"https://cornucopia.owasp.org/cards/SM5","links":\[{"document":{"doctype":"CRE","id":"002-630"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"704-530"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"727-043"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"457-165"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM6","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Gary can take over a user's session because there is a long or no inactivity timeout, or a long or no overall session time limit, or the same session can be used from more than one device/location","sectionID":"SM6","hyperlink":"https://cornucopia.owasp.org/cards/SM6","links":\[{"document":{"doctype":"CRE","id":"065-782"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"238-346"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"673-736"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM7","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Graham can utilize Adam's session after he has finished, because there is no log out function, or he cannot easily log out, or log out does not properly terminate the session","sectionID":"SM7","hyperlink":"https://cornucopia.owasp.org/cards/SM7","links":\[{"document":{"doctype":"CRE","id":"457-165"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"673-736"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM8","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Matt can abuse long sessions because the application does not require periodic re-authentication to check if privileges have changed","sectionID":"SM8","hyperlink":"https://cornucopia.owasp.org/cards/SM8","links":\[{"document":{"doctype":"CRE","id":"065-782"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"618-403"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SM9","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Ivan can steal session identifiers because they are sent over insecure channels, or are logged, or are revealed in error messages, or are included in URLs, or are accessible un-necessarily by code which the attacker can influence or alter","sectionID":"SM9","hyperlink":"https://cornucopia.owasp.org/cards/SM9","links":\[{"document":{"doctype":"CRE","id":"527-034"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"402-133"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"067-050"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"240-274"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"841-710"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"248-646"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"636-854"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SMX","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Marce can forge requests because per-session, or per-request for more critical actions, strong random tokens (i.e. anti-CSRF tokens) or similar are not being used for actions that change state","sectionID":"SMX","hyperlink":"https://cornucopia.owasp.org/cards/SMX","links":\[{"document":{"doctype":"CRE","id":"060-472"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SMJ","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Jeff can resend an identical repeat interaction (e.g. HTTP request, signal, button press) and it is accepted, not rejected","sectionID":"SMJ","hyperlink":"https://cornucopia.owasp.org/cards/SMJ","links":\[{"document":{"doctype":"CRE","id":"534-605"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"456-535"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"746-705"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SMQ","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Salim can bypass session management because it is not applied comprehensively and consistently across the application","sectionID":"SMQ","hyperlink":"https://cornucopia.owasp.org/cards/SMQ","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"582-541"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SMK","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"Peter can bypass the session management controls because they have been self-built and/or are weak, instead of using a standard framework or approved tested module","sectionID":"SMK","hyperlink":"https://cornucopia.owasp.org/cards/SMK","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/SMA","name":"OWASP Cornucopia Website App Edition","section":"SESSION MANAGEMENT","description":"You have invented a new attack against Session Management","sectionID":"SMA","hyperlink":"https://cornucopia.owasp.org/cards/SMA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ2","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Tim can influence where data is sent or forwarded to","sectionID":"AZ2","hyperlink":"https://cornucopia.owasp.org/cards/AZ2","links":\[{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"304-667"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"232-217"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ3","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Christian can access information, which he should not have permission to, through another mechanism that does have permission (e.g. search indexer, logger, reporting), or because it is cached, or kept for longer than necessary, or through other information leakage","sectionID":"AZ3","hyperlink":"https://cornucopia.owasp.org/cards/AZ3","links":\[{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"166-151"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"157-430"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"473-758"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"186-540"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"227-045"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-304"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"268-272"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"307-111"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ4","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Kelly can bypass authorization controls because they do not fail securely (i.e. they default to allowing access)","sectionID":"AZ4","hyperlink":"https://cornucopia.owasp.org/cards/AZ4","links":\[{"document":{"doctype":"CRE","id":"166-151"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ5","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Chad can access resources (including services, processes, AJAX, Flash, video, images, documents, temporary files, session data, system properties, configuration data, registry settings, logs) he should not be able to due to missing authorization, or due to excessive privileges (e.g. not using the principle of least privilege)","sectionID":"AZ5","hyperlink":"https://cornucopia.owasp.org/cards/AZ5","links":\[{"document":{"doctype":"CRE","id":"278-413"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"650-560"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"304-667"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ6","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Eduardo can access data he does not have permission to, even though he has permission to the form/page/URL/entry point","sectionID":"AZ6","hyperlink":"https://cornucopia.owasp.org/cards/AZ6","links":\[{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"304-667"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ7","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Yuanjing can access application functions, objects, or properties he is not authorized to access","sectionID":"AZ7","hyperlink":"https://cornucopia.owasp.org/cards/AZ7","links":\[{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"304-667"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ8","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Tom can bypass business rules by altering the usual process sequence or flow, or by undertaking the process in the incorrect order, or by manipulating date and time values used by the application, or by using valid features for unintended purposes, or by otherwise manipulating control data","sectionID":"AZ8","hyperlink":"https://cornucopia.owasp.org/cards/AZ8","links":\[{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"304-667"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"284-521"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"770-361"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"534-605"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"456-535"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZ9","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Mike can misuse an application by using a valid feature too fast, or too frequently, or other way that is not intended, or consumes the application's resources, or causes race conditions, or over-utilizes a feature","sectionID":"AZ9","hyperlink":"https://cornucopia.owasp.org/cards/AZ9","links":\[{"document":{"doctype":"CRE","id":"746-705"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"630-573"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZX","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Richard can bypass the centralized authorization controls since they are not being used comprehensively on all interactions","sectionID":"AZX","hyperlink":"https://cornucopia.owasp.org/cards/AZX","links":\[{"document":{"doctype":"CRE","id":"344-611"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"650-560"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZJ","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Dinis can access security configuration information, or access control lists","sectionID":"AZJ","hyperlink":"https://cornucopia.owasp.org/cards/AZJ","links":\[{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"418-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"265-800"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"154-031"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZQ","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Christopher can inject a command that the application will run at a higher privilege level","sectionID":"AZQ","hyperlink":"https://cornucopia.owasp.org/cards/AZQ","links":\[{"document":{"doctype":"CRE","id":"857-718"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZK","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"Ryan can influence or alter authorization controls and permissions, and can therefore bypass them","sectionID":"AZK","hyperlink":"https://cornucopia.owasp.org/cards/AZK","links":\[{"document":{"doctype":"CRE","id":"650-560"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"368-633"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"418-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"265-800"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"154-031"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/AZA","name":"OWASP Cornucopia Website App Edition","section":"AUTHORIZATION","description":"You have invented a new attack against Authorization","sectionID":"AZA","hyperlink":"https://cornucopia.owasp.org/cards/AZA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR2","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Kyun can access data because it has been obfuscated rather than using an approved cryptographic function","sectionID":"CR2","hyperlink":"https://cornucopia.owasp.org/cards/CR2","links":\[{"document":{"doctype":"CRE","id":"742-431"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR3","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Axel can modify transient or permanent data (stored or in transit), or source code, or updates/patches, or configuration data, because it is not subject to integrity checking","sectionID":"CR3","hyperlink":"https://cornucopia.owasp.org/cards/CR3","links":\[{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"418-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"265-800"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"154-031"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"028-254"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"307-507"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"253-452"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"208-355"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"347-352"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR4","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Paulo can access data in transit that is not encrypted, even though the channel is encrypted","sectionID":"CR4","hyperlink":"https://cornucopia.owasp.org/cards/CR4","links":\[{"document":{"doctype":"CRE","id":"227-045"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"745-045"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR5","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Kyle can bypass cryptographic controls because they do not fail securely (i.e. they default to unprotected)","sectionID":"CR5","hyperlink":"https://cornucopia.owasp.org/cards/CR5","links":\[{"document":{"doctype":"CRE","id":"527-034"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"036-810"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"248-646"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"636-854"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR6","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Romain can read and modify unencrypted data in memory or in transit (e.g. cryptographic secrets, credentials, session identifiers, personal and commercially-sensitive data), in use or in communications within the application, or between the application and users, or between the application and external systems","sectionID":"CR6","hyperlink":"https://cornucopia.owasp.org/cards/CR6","links":\[{"document":{"doctype":"CRE","id":"527-034"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"558-807"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"270-634"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"227-045"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-304"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"248-646"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"636-854"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR7","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Gunter can intercept or modify encrypted data in transit because the protocol is poorly deployed, or weakly configured, or certificates are invalid, or certificates are not trusted, or the connection can be degraded to a weaker or un-encrypted communication","sectionID":"CR7","hyperlink":"https://cornucopia.owasp.org/cards/CR7","links":\[{"document":{"doctype":"CRE","id":"530-671"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"786-224"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"745-045"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"430-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"537-367"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"036-147"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR8","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Eoin can access stored business data (e.g. passwords, session identifiers, PII, cardholder data) because it is not securely encrypted or securely hashed","sectionID":"CR8","hyperlink":"https://cornucopia.owasp.org/cards/CR8","links":\[{"document":{"doctype":"CRE","id":"622-203"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"742-431"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"674-425"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"227-045"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CR9","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Andy can bypass random number generation, random GUID generation, hashing and encryption functions because they have been self-built and/or are weak","sectionID":"CR9","hyperlink":"https://cornucopia.owasp.org/cards/CR9","links":\[{"document":{"doctype":"CRE","id":"742-431"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"674-425"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"542-488"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"664-571"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CRX","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Susanna can break the cryptography in use because it is not strong enough for the degree of protection required, or it is not strong enough for the amount of effort the attacker is willing to make","sectionID":"CRX","hyperlink":"https://cornucopia.owasp.org/cards/CRX","links":\[{"document":{"doctype":"CRE","id":"664-571"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CRJ","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Justin can read credentials for accessing internal or external resources, services and others systems because they are stored in an unencrypted format, or saved in the source code","sectionID":"CRJ","hyperlink":"https://cornucopia.owasp.org/cards/CRJ","links":\[{"document":{"doctype":"CRE","id":"287-305"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"508-702"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"232-325"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"774-888"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"340-375"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"032-213"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CRQ","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Artim can access or predict the master cryptographic secrets","sectionID":"CRQ","hyperlink":"https://cornucopia.owasp.org/cards/CRQ","links":\[{"document":{"doctype":"CRE","id":"287-305"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"508-702"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"821-832"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"674-425"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-304"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CRK","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"Dan can influence or alter cryptography code/routines (encryption, hashing, digital signatures, random number and GUID generation) and can therefore bypass them","sectionID":"CRK","hyperlink":"https://cornucopia.owasp.org/cards/CRK","links":\[{"document":{"doctype":"CRE","id":"508-702"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"441-132"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"433-122"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"786-224"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"878-880"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CRA","name":"OWASP Cornucopia Website App Edition","section":"CRYPTOGRAPHY","description":"You have invented a new attack against Cryptography","sectionID":"CRA","hyperlink":"https://cornucopia.owasp.org/cards/CRA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C2","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Lee can bypass application controls because dangerous/risky programming language functions have been used instead of safer alternatives, or there are type conversion errors, or because the application is unreliable when an external resource is unavailable, or there are race conditions, or there are resource initialization or allocation issues, or overflows can occur","sectionID":"C2","hyperlink":"https://cornucopia.owasp.org/cards/C2","links":\[{"document":{"doctype":"CRE","id":"314-131"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C3","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Andrew can access source code, or decompile, or otherwise access business logic to understand how the application works and any secrets contained","sectionID":"C3","hyperlink":"https://cornucopia.owasp.org/cards/C3","links":\[{"document":{"doctype":"CRE","id":"253-452"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C4","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Keith can perform an action and it is not possible to attribute it to him","sectionID":"C4","hyperlink":"https://cornucopia.owasp.org/cards/C4","links":\[{"document":{"doctype":"CRE","id":"841-710"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"443-447"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C5","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Larry can influence the trust other parties including users have in the application, or abuse that trust elsewhere (e.g. in another application)","sectionID":"C5","hyperlink":"https://cornucopia.owasp.org/cards/C5","links":\[{"document":{"doctype":"CRE","id":"530-671"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"232-217"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"745-045"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"430-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"537-367"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C6","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Aaron can bypass controls because error/exception handling is missing, or is implemented inconsistently or partially, or does not deny access by default (i.e. errors should terminate access/execution), or relies on handling by some other service or system","sectionID":"C6","hyperlink":"https://cornucopia.owasp.org/cards/C6","links":\[{"document":{"doctype":"CRE","id":"166-15"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"555-048"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C7","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Mwengu's actions cannot be investigated because there is not an adequate accurately time-stamped record of security events, or there is not a full audit trail, or these can be altered or deleted by Mwengu, or there is no centralized logging service","sectionID":"C7","hyperlink":"https://cornucopia.owasp.org/cards/C7","links":\[{"document":{"doctype":"CRE","id":"240-274"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"555-048"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"841-710"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"443-447"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"048-612"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"713-683"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"015-063"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"668-364"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C8","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"David can bypass the application to gain access to data because the network and host infrastructure, and supporting services/applications, have not been securely configured, the configuration rechecked periodically and security patches applied, or the data is stored locally, or the data is not physically protected","sectionID":"C8","hyperlink":"https://cornucopia.owasp.org/cards/C8","links":\[{"document":{"doctype":"CRE","id":"801-310"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"154-031"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"418-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"208-355"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"347-352"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-334"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"462-245"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/C9","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Michael can bypass the application to gain access to data because administrative tools or administrative interfaces are not secured adequately","sectionID":"C9","hyperlink":"https://cornucopia.owasp.org/cards/C9","links":\[{"document":{"doctype":"CRE","id":"801-310"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"201-246"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CX","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Spyros can circumvent the application's controls because code frameworks, libraries and components contain malicious code or vulnerabilities (e.g. in-house, commercial off the shelf, outsourced, open source, externally-located)","sectionID":"CX","hyperlink":"https://cornucopia.owasp.org/cards/CX","links":\[{"document":{"doctype":"CRE","id":"053-751"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"611-158"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"838-636"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"418-525"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"265-800"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-334"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CJ","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Roman can exploit the application because it was compiled using out-of-date tools, or its configuration is not secure by default, or security information was not documented and passed on to operational teams","sectionID":"CJ","hyperlink":"https://cornucopia.owasp.org/cards/CJ","links":\[{"document":{"doctype":"CRE","id":"053-751"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"253-452"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"314-131"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"180-488"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"208-355"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"347-352"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"715-334"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CQ","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Jim can undertake malicious, non-normal, actions without real-time detection and response by the application","sectionID":"CQ","hyperlink":"https://cornucopia.owasp.org/cards/CQ","links":\[{"document":{"doctype":"CRE","id":"176-154"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"534-605"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"456-535"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"746-705"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"630-573"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CK","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"Grant can utilize the application to deny service to some or all of its users","sectionID":"CK","hyperlink":"https://cornucopia.owasp.org/cards/CK","links":\[{"document":{"doctype":"CRE","id":"802-056"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"746-705"},"ltype":"Linked To"},{"document":{"doctype":"CRE","id":"630-573"},"ltype":"Linked To"}],"tags":["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/CA","name":"OWASP Cornucopia Website App Edition","section":"CORNUCOPIA","description":"You have invented a new attack of any type","sectionID":"CA","hyperlink":"https://cornucopia.owasp.org/cards/CA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/JOA","name":"OWASP Cornucopia Website App Edition","section":"WILD CARD","description":"Alice can utilize the application to attack users' systems and data","sectionID":"JOA","hyperlink":"https://cornucopia.owasp.org/cards/JOA","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"},{"doctype":"Tool","id":"https://cornucopia.owasp.org/cards/JOB","name":"OWASP Cornucopia Website App Edition","section":"WILD CARD","description":"Bob can influence, alter or affect the application so that it no longer complies with legal, regulatory, contractual or other organizational mandates","sectionID":"JOB","hyperlink":"https://cornucopia.owasp.org/cards/JOB","links":\[\],"tags":\["Threat modeling","Website Application"],"tooltype":"Defensive"}]}