Insecure Direct Object References/README.md
Insecure Direct Object References (IDOR) is a security vulnerability that occurs when an application allows users to directly access or modify objects (such as files, database records, or URLs) based on user-supplied input, without sufficient access controls. This means that if a user changes a parameter value (like an ID) in a URL or API request, they might be able to access or manipulate data that they aren’t authorized to see or modify.
IDOR stands for Insecure Direct Object Reference. It's a type of security vulnerability that arises when an application provides direct access to objects based on user-supplied input. As a result, attackers can bypass authorization and access resources in the system directly, potentially leading to unauthorized information disclosure, modification, or deletion.
Example of IDOR:
Imagine a web application that allows users to view their profile by clicking a link https://example.com/profile?user_id=123:
<?php
$user_id = $_GET['user_id'];
$user_info = get_user_info($user_id);
...
Here, user_id=123 is a direct reference to a specific user's profile. If the application doesn't properly check that the logged-in user has the right to view the profile associated with user_id=123, an attacker could simply change the user_id parameter to view other users' profiles:
https://example.com/profile?user_id=124
Increment and decrement these values to access sensitive information.
287789, 287790, 287791, ...0x4642d, 0x4642e, 0x4642f, ...1695574808, 1695575098, ...Examples:
Some identifiers can be guessed like names and emails, they might grant you access to customer data.
john, doe, john.doe, ...[email protected]am9obi5kb2VAbWFpbC5jb20=Examples:
95f6e264-bb00-11ec-8833-00155d01ef005ae9b90a2c144b9def01ec37
Examples:
Sometimes we see websites using hashed values to generate a random user id or token, like sha1(username), md5(email), ...
098f6bcd4621d373cade4e832627b4f6a94a8fe5ccb19ba61c4c0873d391e987982fbbd39f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08Examples:
Send a wildcard (*, %, ., _) instead of an ID, some backend might respond with the data of all the users.
GET /api/users/* HTTP/1.1GET /api/users/% HTTP/1.1GET /api/users/_ HTTP/1.1GET /api/users/. HTTP/1.1POST → PUTXML → JSON{"id":19} → {"id":[19]}user_id=hacker_id&user_id=victim_id