OBJECTIVE 02 — WEB APPLICATION THREATS

CEH CORE STATEMENT (MEMORIZE)

Item Memorize
Web Application Threat Any weakness in application logic, input handling, authentication, or configuration that can be exploited to compromise confidentiality, integrity, or availability

OWASP TOP 10 (2021) — MASTER LIST (EXAM MUST)

Rank Vulnerability Code Name
1 A01:2021 Broken Access Control
2 A02:2021 Cryptographic Failures
3 A03:2021 Injection
4 A04:2021 Insecure Design
5 A05:2021 Security Misconfiguration
6 A06:2021 Vulnerable and Outdated Components
7 A07:2021 Identification and Authentication Failures
8 A08:2021 Software and Data Integrity Failures
9 A09:2021 Security Logging and Monitoring Failures
10 A10:2021 Server-Side Request Forgery (SSRF)

MEMORY HOOK:
Access → Crypto → Injection → Design → Config → Components → Auth → Integrity → Logging → SSRF


A01:2021 — BROKEN ACCESS CONTROL

Core Definition

Item Memorize
Meaning Failure to enforce restrictions on authenticated users
Result Unauthorized actions

Common Causes

Cause
Missing access checks
Client-side access control
IDOR (Insecure Direct Object Reference)
Metadata manipulation
Force browsing

Attack Logic

Step Action
1 User authenticates
2 Modifies request
3 Server fails to verify authorization
4 Unauthorized resource accessed

Impact

Impact
Data exposure
Privilege escalation
Account takeover

A02:2021 — CRYPTOGRAPHIC FAILURES

Core Definition

Item Memorize
Meaning Improper use or absence of cryptography
Affects Data in transit and at rest

Common Failures

Failure
Plaintext data transmission
Weak encryption algorithms
Hardcoded keys
No TLS
Improper key management

Impact

Impact
Data leakage
MITM attacks
Credential theft

MEMORY HOOK:
No crypto → stolen data


A03:2021 — INJECTION

Core Definition

Item Memorize
Meaning Untrusted input interpreted as commands
Root Cause Lack of input validation

Injection Types

Type
SQL Injection
NoSQL Injection
OS Command Injection
LDAP Injection
XPath Injection

Injection Logic

Step Action
1 Attacker submits crafted input
2 Application trusts input
3 Interpreter executes payload

Impact

Impact
Data loss
Authentication bypass
Remote code execution

A04:2021 — INSECURE DESIGN

Core Definition

Item Memorize
Meaning Missing or ineffective security controls
Phase Design stage

Characteristics

Characteristic
No threat modeling
Missing business logic validation
Insecure workflows

Exam Trap

Trap Correct
Coding bug NO
Design flaw YES

A05:2021 — SECURITY MISCONFIGURATION

Core Definition

Item Memorize
Meaning Incorrect security configuration
Layer Application, server, platform

Examples

Example
Default credentials
Verbose errors
Unnecessary services
Directory listing
Unpatched software

Impact

Impact
Information disclosure
Full compromise

A06:2021 — VULNERABLE AND OUTDATED COMPONENTS

Core Definition

Item Memorize
Meaning Using components with known vulnerabilities
Includes Libraries, frameworks, OS

Causes

Cause
No inventory
No patching
Unsupported software

Impact

Impact
Exploitable known CVEs
Full system compromise

MEMORY HOOK:
Old = exploitable


A07:2021 — IDENTIFICATION AND AUTHENTICATION FAILURES

Core Definition

Item Memorize
Meaning Weak or broken auth mechanisms
Replaces Broken Authentication

Examples

Example
Weak passwords
No MFA
Session fixation
Credential stuffing

Impact

Impact
Account takeover
Privilege escalation

A08:2021 — SOFTWARE AND DATA INTEGRITY FAILURES

Core Definition

Item Memorize
Meaning Lack of integrity verification
Target Updates, CI/CD, serialized data

Examples

Example
Unsigned updates
Insecure deserialization
Compromised plugins

Impact

Impact
Remote code execution
Supply-chain compromise

A09:2021 — SECURITY LOGGING AND MONITORING FAILURES

Core Definition

Item Memorize
Meaning Inability to detect attacks
Root Cause Missing or weak logging

Examples

Example
No logs
Logs not monitored
No alerts

Impact

Impact
Delayed breach detection
Extended attacker persistence

A10:2021 — SERVER-SIDE REQUEST FORGERY (SSRF)

Core Definition

Item Memorize
Meaning Server makes unauthorized requests
Controlled By Attacker input

SSRF Logic

Step Action
1 Attacker supplies URL
2 Server fetches resource
3 Internal systems accessed

Impact

Impact
Internal port scanning
Cloud metadata access
Credential leakage

MEMORY HOOK:
Server becomes attacker’s proxy