BFLA
This can lead to unauthorized actions or access to sensitive functionalities, potentially compromising security or affecting application integrity.
Implement strict authorization checks for every function or endpoint, enforce role-based or attribute-based access controls, and regularly audit and test access controls to ensure proper restrictions are in place.
General Information
Testing for BFLA involves the same steps as BOLA; instead of creating and using same permission accounts, such as userA
and userB
, we need to have different permission accounts, such as authenticated vs. unauthenticated and/or low-privileged vs. high-privileged.
Find functional endpoints that require specific permissions.
Login to an account that does not have these permissions.
Repeat the requests identified in Step 1 with the account used on Step 2.
Examples
Admin Access
The below example is based on the crAPI application.

userB
's video with userA
's token.No-Role Access
The below example is based on HTB's API Attacks module.

Last updated
Was this helpful?