IDOR
IDOR occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system
Tools
Burp Suite plugin Authorize
Burp Suite plugin Authz
Burp Suite plugin AuthMatrixTest For IDOR
- Test to change the ID parameter
- Test to add parameters at the endpoints
- Test for HTTP parameter pollution
- Test by adding an extension at the end
- Test with outdated API versions
- Test by wrapping the ID with an array
- Test by wrapping the ID with a JSON object
- Test for JSON parameter pollution
- Test by changing the case
- Test for path traversal
- Test by changing words
- Test by changing methodsBasics
Bypasses
Add parameters onto the endpoints for example, if there was
HTTP Parameter pollution
Change the request method:
Add .json to the endpoint, if it is built in Ruby!
Test on outdated API Versions
Wrap the ID with an array.
Wrap the ID with a JSON object:
JSON Parameter Pollution:
Last updated