BOLA
This can lead to unauthorized access to sensitive data or actions, as attackers can exploit insufficient authorization checks to view or modify other users' data or resources.
Implement robust server-side authorization checks, ensure that access controls are enforced for every request, and avoid exposing direct references to sensitive objects in user inputs.
General Information
Testing for BOLA involves:
Identifying relevant requests, i.e., requests that have resources IDs and/or that access other resources.
Perform A-B testing:
Create and make requests as
userA
.Create
userB
and repeat the requests touserA
's resources usinguserB
's token.
Example
The below example is based on the crAPI application.
The below example shows how A/B testing works:
Two users are created:
userA
anduserB
(Figure 1).

userA
).We have uploaded a video on
userB
's profile as well as booked a vehicle.We request the video and car's details with
userB
's token and we save these requests.We then replace
userB
's withuserA
's token and trying to access the same information (Figure 2).

userA
's token.We are unable to access the video information (Figure 3), but we are able to access the car's information (Figure 4). The latter is considered a BOLA flaw.

userB
's video with userA
's token.
userB
's vehicle details with userA
's token.Last updated
Was this helpful?