Insecure Direct Object Reference
IDOR
Last updated
Was this helpful?
IDOR
Last updated
Was this helpful?
Insecure Direct Object References(IDOR) occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers can bypass authorization and access resources in the system directly, for example, database records or files.In simple words, it’s like getting sensitive information by just changing a few values in the parameter.
Hacker identifies web application using direct object reference(s) and requests verified information. Valid http request is executed and direct object reference entity is revealed.
Direct object reference entity is manipulated and http request is performed again. Http request is performed without user verification and hacker is granted access to sensitive information.
Enforce access control policies such that users cannot act outside of their intended permissions.
Use hash function and use hashed values instead of normal numbers or strings.
Instead of this,
We can make it like this,
)