Ethical hacker Brad is testing insecure direct object reference.
He attempts to gain account access to resources under a username he discovered called Joe.
Which of the following best demonstrates an attempt to exploit the insecure direct object reference?
GET /restricted/accounts/?name=Joe
HTTP/1.1 Host:somebank.com
this attempts direct access to Joe`s account.
The following is from OWASP´s page on the subject:
"Applications frequently use the actual name or key of an object when generating web pages.
Applications don´t always verify the user is authorized for the target object.
This results in an insecure direct object reference flaw"
An attacker, who is an authorized system user, simply changes a parameter value that directly refers to a system object to another object the user isn´t authorized for.
Sem comentários:
Enviar um comentário