PayloadsAllTheThings/Insecure Direct Object Refe...
Swissky 404afd1d71 Fix name's capitalization 2019-03-07 00:07:55 +01:00
..
README.md Fix name's capitalization 2019-03-07 00:07:55 +01:00
idor.png Fix name's capitalization 2019-03-07 00:07:55 +01:00

README.md

Insecure Direct Object References

Insecure Direct Object References occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly, for example database records or files. - OWASP

Tools :

  • Burp Suite plugin Authz
  • Burp Suite plugin AuthMatrix
  • Burp Suite plugin Authorize

Exploit

https://lh5.googleusercontent.com/VmLyyGH7dGxUOl60h97Lr57F7dcnDD8DmUMCZTD28BKivVI51BLPIqL0RmcxMPsmgXgvAqY8WcQ-Jyv5FhRiCBueX9Wj0HSCBhE-_SvrDdA6_wvDmtMSizlRsHNvTJHuy36LG47lstLpTqLK

The value of a parameter is used directly to retrieve a database record.

http://foo.bar/somepage?invoice=12345

The value of a parameter is used directly to perform an operation in the system

http://foo.bar/changepassword?user=someuser

The value of a parameter is used directly to retrieve a file system resource

http://foo.bar/showImage?img=img00011

The value of a parameter is used directly to access application functionality

http://foo.bar/accessPage?menuitem=12

Examples

References