Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update template.md: L5 Removed Duplicate Space L8-13 List in BlockQuote… #508

Open
wants to merge 2 commits into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
34 changes: 21 additions & 13 deletions submissions/description/broken_access_control/idor/template.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,29 +2,37 @@

## Overview of the Vulnerability

Insecure Direct Object Reference (IDOR) occurs when there are no access control checks to verify if a request to interact with a resource is valid. An IDOR vulnerability within this application can be leveraged by an attacker to manipulate, destroy, or disclose data through their ability to bypass access controls, horizontally or vertically escalate their privileges, and gain access to sensitive information or take over users' accounts.
Insecure Direct Object Reference (IDOR) occurs when there are no access control checks to verify if a request to interact with a resource is valid. An IDOR vulnerability within this application can be leveraged by an attacker to manipulate, destroy, or disclose data through their ability to bypass access controls and horizontally or vertically escalate their privileges.

## Business Impact
Given the type of IDOR within an application, an attacker could perform the following actions:
>
> - Gain unauthorized access to data from the application and retrieve privileged information
> - Perform unauthorized operations, such as escalating their privileges within the application, or forcing a password change on a user’s account in order to takeover that account
> - Manipulate internal application objects and elevate their privileges, alter data, or gain access to and manipulate the application’s APIs
> - Gain direct access to files and manipulate the file system, such as uploading, downloading, adding, or deleting data, including other user’s data.
>

IDOR can lead to indirect financial loss through an attacker accessing, deleting, or modifying data from within the application. This could also result in reputational damage for the business through the impact to customers’ trust. The severity of the impact to the business is dependent on the sensitivity of the data being stored in, and transmitted by the application.
## Business Impact:

## Steps to Reproduce
IDOR can lead to indirect financial loss through an attacker accessing, deleting, or modifying data from within the application. This could also result in reputational damage for the business through the impact to customers’ trust. The severity of the impact to the business is dependent on the sensitivity of the data being stored in, and transmitted by, the application.

1. Use a browser to navigate to: {{URL}}
## Steps to Reproduce:

1. Use a browser to navigate to the URL: {{URL}}
1. Login to User Account A
1. In the URL bar, modify the parameter to a different value:

{{eg.<https://example.com/parameter(UserAccountB)>}}

1. Observe that the application displays information of User Account B, as seen in the screenshot below:

{{screenshot}}
1. Observe that the application displays information of User Account B, as seen in the screenshot(s) below:
>
> {{screenshot}}

## Proof of Concept (PoC)
## Proof of Concept (PoC):

Below is a screenshot demonstrating the exposed object executing:

{{screenshot}}
>
> {{screenshot}}

A malicious attacker could leverage this IDOR vulnerability to extract data by using the following payload:

Expand All @@ -33,5 +41,5 @@ A malicious attacker could leverage this IDOR vulnerability to extract data by u
```

The following screenshot(s) demonstrate(s) this additional impact:

{{screenshot}}
>
> {{screenshot}}
Loading