IDOR / BFLA
Last updated
Was this helpful?
Last updated
Was this helpful?
This can lead to unauthorized access to resources, data exposure, or unintended actions being performed by exploiting inadequate authorization checks.
Implement robust access controls and authorization checks for every request, ensure proper validation of user permissions, and avoid exposing sensitive object references or functionality directly.
The example below is based on PostSwigger's lab.
Burp's Active Scan reveals an exposed robots.txt
file which reveals the /administrator-panel
directory (Figure 1).
This directory gives us direct access to administrative functionalities (Figure 2).