diff --git a/IDOR.md b/IDOR.md index 87cd1a2..c337f63 100644 --- a/IDOR.md +++ b/IDOR.md @@ -2,8 +2,6 @@ Insecure direct object references (IDOR) are a type of access control vulnerability that arises when an application uses user-supplied input to access objects directly. The term IDOR was popularized by its appearance in the OWASP 2007 Top Ten. However, it is just one example of many access control implementation mistakes that can lead to access controls being circumvented. IDOR vulnerabilities are most commonly associated with horizontal privilege escalation, but they can also arise in relation to vertical privilege escalation. -Source: [portswigger.net](https://portswigger.net/web-security/access-control/idor) - 1. Add parameters onto the endpoints for example, if there was ```html GET /api/v1/getuser @@ -101,3 +99,5 @@ GET /graphql GET /graphql.php?query= [...] ``` + +Source: [@swaysThinking](https://twitter.com/swaysThinking) and other medium writeup!