Broken Access Control

Attackers exploit weaknesses to bypass authentication or authorization, gaining access to sensitive data or functionalities.

Common Exploits:

  • Path Traversal: Accessing unauthorized files by manipulating URL paths.

  • Robots.txt: Using improperly configured files to discover sensitive paths.

  • IDOR (Insecure Direct Object Reference):

    • Exploiting predictable or poorly protected identifiers (e.g., URLs with encoded or hashed parameters).

    • Example: Accessing resources by creating fake accounts to test parameter patterns.

  • Session Cookies: Tampering with session cookies to gain unauthorized access.

Last updated