Project: WASC Threat Classification
Threat Type: Weakness
Reference ID: WASC-21
Insufficient Anti-automation
Insufficient Anti-automation occurs when a web application permits an attacker to automate a process that was originally designed to be performed only in a manual fashion, i.e. by a human web user.
Web application functionality that is often a target for automation attacks may include:
- Application login forms – attackers may automate brute force login requests in an attempt to guess user credentials
- Service registration forms – attackers may automatically create thousands of new accounts
- Email forms – attackers may exploit email forms as spam relays or for flooding a certain user’s mailbox
- Account maintenance – attackers may perform mass DoS against an application, by flooding it with numerous requests to disable or delete user accounts
- Account information forms – attackers may perform mass attempts to harvest user personal information from a web application
- Comment forms / Content Submission forms – these may be used for spamming blogs, web forums and web bulletin boards by automatically submitting contents such as spam or even web-based malware
- Forms tied to SQL database queries – these may be exploited in order to perform a denial of service attack against the application. The attack is performed by sending numerous heavy SQL queries in a short period of time, hence denying real users from service.
- eShopping / eCommerce – eShopping and eCommerce applications that do not enforce human-only buyers, can be exploited in order to buy preferred items in large amounts, such as sporting events tickets. These are later sold by scalpers for higher prices.
- Online polls – polls and other types of online voting systems can be automatically subverted in favor of a certain choice.
- Web-based SMS message sending – attackers may exploit SMS message sending systems in order to spam mobile phone users

