OWASP Security Shepherd Project - Insecure Direct Object References Lesson
What is Insecure Direct Object References Vulnerability/Threat?
Insecure Direct Object References occur when an application references an object by its actual ID or name. This object that is referenced directly is used to generate a web page. If the application does not verify that the user is allowed to reference this object, then the object is insecurely referenced.Attackers can use insecure object references to compromise any information that can be referenced by the parameter. The severity of insecure direct object references varies depending on the data that is compromised. If the compromised data is publicly available or not supposed to be restricted, it becomes a very low severity vulnerability. On the other hand, if the scenario is one company is able to retrieve their competitor's information. Suddenly, the business impact of the vulnerability is critical. These vulnerabilities need to be fixed and should never be found in professional grade applications.
Lesson
In this lesson, we are ask to view administrators profile, while we could only see the guest profile at this point. Once again, let's try our BurpSuite or ZAP to capture the HTTP request/response.
After we press the Refresh Your Profile button, we can see the field that username=guest. What if we change it to admin directly?
By forwarding the request, we complete the lesson : P
留言
張貼留言
Welcome to share your comments or questions : -)
Enjoy life!