terça-feira, 11 de junho de 2019

4

Ethical hacker Brad is testing insecure direct object reference.

He attempts to gain account access to resources under a username he discovered called Joe.

Which of the following best demonstrates an attempt to exploit the insecure direct object reference?

GET /restricted/accounts/?name=Joe
HTTP/1.1 Host:somebank.com


this attempts direct access to Joe`s account.

The following is from OWASP´s page on the subject:

"Applications frequently use the actual name or key of an object when generating web pages.
Applications don´t always verify the user is authorized for the target object.
This results in an insecure direct object reference flaw"


An attacker, who is an authorized system user, simply changes a parameter value that directly refers to a system object to another object the user isn´t authorized for.


Sem comentários:

Enviar um comentário