Description
A resource that should require authentication is accessible without proper authentication mechanisms in place. This vulnerability allows unauthorized access to potentially sensitive information or functionality.
Remediation
1. Implement proper authentication mechanisms for all sensitive resources. 2. Ensure that authentication checks are performed server-side before granting access. 3. Use strong, industry-standard authentication protocols (e.g., OAuth 2.0, JWT). 4. Regularly audit and test authentication mechanisms to ensure they are functioning correctly.
References
OWASP API Security Top 10 2023: API2 - Broken Authentication
OWASP API Security Top 10 2023: API5 - Broken Function Level Authorization