Skip to content

Security Test: Leaking authentication

Description

Default Severity:

When a server gives out too much detail about how it handles authentication, it can tip off attackers about the inner workings of your system. Essentially, the vulnerability happens when error messages or responses include sensitive details—like which part of the authentication failed or what user information exists—making it much easier for someone with bad intentions to figure out how to bypass security checks. If left unchecked, this can lead to unauthorized access to accounts or even control over the system. The common misstep is not sanitizing the responses or revealing internal error details that could help an attacker piece together how the authentication process works.

Configuration

Identifier: information_disclosure/leaking_authentication

Examples

All configuration available:

checks:
  information_disclosure/leaking_authentication:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API7:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 8.2.1
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.18.1
NIST SP800-53
FedRAMP AC-6
CWE 200
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C
CVSS Score 7.2