githubEdit

IDOR (Insecure Direct Object References) Attack

IDOR is a type of access control vulnerability in web applications.

Find Vulnerabilities from HTML Source Code

First check values of attributes on input elements.

<input name="user_id" value="8" >

Then try what will happen when you change the Cookie value in a HTTP header.

Cookie: user_id=12

Change GET Parameters

Manual

/user?id=1
/user?id=2
/user?id=-1
/user?id=00

/admin/posts/1
/admin/posts/-1
/admin/posts/00

/static/1.txt
/static/2.txt
/static/-1.txt
/static/00.txt

Automation

Change POST Parameters

Basics

Bypasses

  • Add parameters onto the endpoints for example, if there was

  • HTTP Parameter pollution

  • Add .json to the endpoint, if it is built in Ruby!

  • Test on outdated API Versions

Wrap the ID with an array.

Wrap the ID with a JSON object:

JSON Parameter Pollution:

Last updated