profile_image
Stop Polluting My Params!
Time2 Hours
LevelMedium
start lab

What is Insecure Direct Object References Attack?

An insecure direct object reference (IDOR) is an access control vulnerability where invalidated user input can be used for unauthorized access to resources or operations. It occurs when an attacker gains direct access by using user-supplied input to an object that has no authorization to access. Attackers can bypass the authorization mechanism to access resources in the system directly by exploiting this vulnerability.Every resource instance can be called as an object and often, represented with and ID. And if these IDs are easy enough to guess or an object can be used by an attacker to bypass access check somehow, we can talk about an IDOR at this point. Referring to the above image, an attacker by ethical means can only get the document numbered 101 which is legally his. But what if the web application does not validate the number and an attacker puts the number of its victim. This can cause the attacker get hold of the sensitive document which he should not have access to.

Severity

The severity of IDOR varies from P3 to P2 depending on what data is being exposed.

Exploiting IDOR

1

Find an entry point.

2

Change the value of that parameter to something else.

3

Send the request and check if you have been authenticated or have got the resource that does not belong to you.