Scenario: You are conducting authorization testing for a web application. During your test, you discover that a regular user can access admin-level features without proper authorization. What type of vulnerability have you identified, and how should it be addressed?

  • Broken Authentication
  • Cross-Site Scripting (XSS)
  • Insecure Direct Object References
  • SQL Injection
In this scenario, the vulnerability identified is Insecure Direct Object References (IDOR). It occurs when an application exposes internal implementation objects to users without proper authorization. To address this, the application should implement proper access controls and validate user permissions before granting access to sensitive features or data.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *