Insecure Direct Object References (IDOR) Flashcards

1
Q

What’s IDOR and what does it allow attackers to do?

A
  • occurs when an application exposes internal object references, such as database records, files, or resources, without proper authorization checks
  • allows an attacker to manipulate these references to access unauthorized data or perform unintended actions
  • can enable an attacker to bypass access controls and gain unauthorized access to sensitive information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What typically allows this vulnerability to exist?

A
  • lack of indirect access checks
  • instead of using indirect references, such as unique identifiers or tokens, to access resources, the application directly exposes internal references that can be easily manipulated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can be IDOR exploited?

A

by modifying URL parameters, intercepting and manipulating requests, or crafting custom requests to access restricted resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the mitigation strategies that address the IDOR vulnerability?

A
  • Implement Proper Access Controls
  • Use Indirect Object References
  • Implement Access Validation
  • Perform Input Validation and Sanitization
  • Apply Security Testing and Code Reviews
How well did you know this?
1
Not at all
2
3
4
5
Perfectly