1. Broken Access Control
What is Broken Access Control?
Scenario 1
The application uses unverified data in a SQL call that is accessing account information:
An attacker simply modifies the browser's 'acct' parameter to send whatever account number they want. If not correctly verified, the attacker can access any user's account.
Scenario 2
An attacker simply forces browses to target URLs. Admin rights are required for access to the admin page.
If an unauthenticated user can access either page, it's a flaw. If a non-admin can access the admin page, this is a flaw.
Reference
Last updated
Was this helpful?