BFLA
Last updated
Was this helpful?
Last updated
Was this helpful?
This can lead to unauthorized actions or access to sensitive functionalities, potentially compromising security or affecting application integrity.
Implement strict authorization checks for every function or endpoint, enforce role-based or attribute-based access controls, and regularly audit and test access controls to ensure proper restrictions are in place.
Testing for BFLA involves the same steps as ; instead of creating and using same permission accounts, such as userA
and userB
, we need to have different permission accounts, such as authenticated vs. unauthenticated and/or low-privileged vs. high-privileged.
Find functional endpoints that require specific permissions.
Login to an account that does not have these permissions.
Repeat the requests identified in Step 1 with the account used on Step 2.
The below example is based on the application.
The below example is based on HTB's module.
userB
's video with userA
's token.