IDOR / BOLA
This can lead to unauthorized access to sensitive data or actions, as attackers can exploit insufficient access controls to view or modify other users' data.
Implement proper access controls and authorization checks on the server side, validate and restrict access to resources based on user roles, and avoid exposing direct references to sensitive objects.
IDORs can be categorized as:
Static File IDORs: When the application uses easily guessable IDs in URLs to access files or data.
Database Object Referencing IDORs (ID-Based): When an endpoint insecurely references database objects by their IDs, allowing unauthorized access.
API Key Access
When we log into the application with the user wiener
, we can directly see his API key (Figure 1).
It seems that the session
cookie is not tied to a specific user. As a result, we can access carlos
's API key by forwarding the latter request in the Repeater and changing the id
parameter (Figure 2).
Logs Access
This application has a Live Chat functionality which also provides the ability to view a chat's transcript. The latter feature reveals the directory where the transcript is stored (Figure 3).
Last updated
Was this helpful?