WSTG - v4.1
Testing for Vulnerable Remember Password
ID |
---|
WSTG-ATHN-05 |
Summary
Credentials are the most widely used authentication technology. Due to such a wide usage of username-password pairs, users are no longer able to properly handle their credentials across the multitude of used applications.
In order to assist users with their credentials, multiple technologies surfaced:
- Applications provide a remember me functionality that allows the user to stay authenticated for long periods of time, without asking the user again for their credentials.
- Password Managers - including browser password managers - that allow the user to store their credentials in a secure manner and later on inject them in user-forms without any user intervention.
How to Test
As these methods provide a better user experience and allow the user to forget all about their credentials, they increase the attack surface area. Some applications:
- Store the credentials in an encoded fashion in the browser’s storage mechanisms, which can be verified by following the web storage testing scenario and going through the session analysis scenarios. Credentials shouldn’t be stored in any way in the client-side application, and should be substitued by tokens generated from the server side.
- Automatically inject the user’s credentials that can be abused by:
- ClickJacking attacks.
- CSRF attacks.
- Tokens should be analyzed in terms of token-lifetime, where some tokens never expire and put the users in danger if those tokens ever get stolen. Make sure to follow the session timeout testing scenario.
Remediation
- Follow session management good practices.
- Ensure that no credentials are stored in clear text or are easily retrievable in encoded or encrypted forms in browser storage mechanisms; they should be stored on the server side and follow password storage good practices.