IDOR

IDOR occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system

Tools

Burp Suite plugin Authorize
Burp Suite plugin Authz
Burp Suite plugin AuthMatrix

Test For IDOR

- Test to change the ID parameter
- Test to add parameters at the endpoints
- Test for HTTP parameter pollution
- Test by adding an extension at the end
- Test with outdated API versions
- Test by wrapping the ID with an array
- Test by wrapping the ID with a JSON object
- Test for JSON parameter pollution
- Test by changing the case
- Test for path traversal
- Test by changing words
- Test by changing methods

Basics

Bypasses

  • Add parameters onto the endpoints for example, if there was

  • HTTP Parameter pollution

Change the request method:

  • Add .json to the endpoint, if it is built in Ruby!

  • Test on outdated API Versions

Wrap the ID with an array.

Wrap the ID with a JSON object:

JSON Parameter Pollution:

Last updated