1. Broken Access Control
What is Broken Access Control?
Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits.
Scenario 1
The application uses unverified data in a SQL call that is accessing account information:
An attacker simply modifies the browser's 'acct' parameter to send whatever account number they want. If not correctly verified, the attacker can access any user's account.
Scenario 2
An attacker simply forces browses to target URLs. Admin rights are required for access to the admin page.
If an unauthenticated user can access either page, it's a flaw. If a non-admin can access the admin page, this is a flaw.
Reference
Last updated