IDOR occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system
Tools
Burp Suite plugin AuthorizeBurp Suite plugin AuthzBurp Suite plugin AuthMatrix
Test For IDOR
- Test to change the ID parameter- Test to add parameters at the endpoints- Test for HTTP parameter pollution- Test by adding an extension at the end- Test with outdated API versions- Test by wrapping the IDwith an array- Test by wrapping the IDwith a JSON object- Test for JSON parameter pollution- Test by changing the case- Test for path traversal- Test by changing words- Test by changing methods