Broken Access Control

OWASP (Open Web Application Security Project)

Created: 2022-07-11
Tags: #fleeting


Abstract:


Basically, attacker w/ no permission access a protected page such as admin controls
Attacker bypass authorization which allows them to view sensitive data as if they had an admin rights

Scenario Example

Application uses unverified data in a SQL call that's accessing account info.
This is a vulnerable code below

pstmt.setString(1, request.getParameter("acct"));
ResultSet results = pstmt.executeQuery( );

Attacker can simply change "acct" parameter in url browser!
especially if not properly verified
-> Attacker can access to any user account
-> http://example.com/app/accountInfo?acct=notmyacct

IDOR (Insecure Direct Object Reference)

Type of Access Control Vulnerability

We log in to our bank account, after we log in, we got taken into page like this
https://example.com/bank?account_number=1234
PROBLEM: Attacker can change the account_number parameter to 1235
-> If not properly verified
-> Attacker could have access to someone else's bank info.

References