We used the STRIDE framework to categorise and evaluate threats, ensuring a structured approach to identifying potential security flaws across the application's architecture.
To clearly illustrate the relationship between threats, causes, impacts and security controls, we developed a Bowtie Diagram to visualise how an attacker could compromise the administrator account.
Below is an overview of threats identified using the STRIDE methodology:
| Threat Category | Description | Juice Shop Example |
|---|---|---|
|
S
Spoofing
|
Impersonating a legitimate user or service. | Login Admin Bypass |
|
T
Tampering
|
Unauthorised modification of data. | Manipulating API requests |
|
R
Repudiation
|
Denying an action took place (no logging). | Missing logs on actions |
|
I
Info Disclosure
|
Exposure of sensitive information. | Sensitive Data Exposure |
|
D
Denial of Service
|
Disrupting service availability. | Brute Force / FTP overload |
|
E
Elevation
|
Gaining unauthorized higher access. | Admin route access |
Scenario: Administrator Account Compromise
Our assessment highlights significant weaknesses across authentication, input validation, access control and data handling. Addressing these issues—through parameterised queries, strong credentials, proper authorisation checks and secure configuration—will greatly reduce the attack surface of the application. Continuous monitoring and periodic security reviews are recommended to maintain a robust security posture.