Vulnerabilities/

Insecure Direct Object Reference (IDOR)

Severity:
High

Description

IDOR occurs when an application provides direct access to objects based on user input without proper authorization checks. This vulnerability allows attackers to manipulate object identifiers to access sensitive information or perform unauthorized operations. For example, changing a user ID in a URL parameter might grant access to another user’s account details.

Recommendation

To mitigate IDOR vulnerabilities, implement access control mechanisms that validate user permissions before granting access to resources. Use indirect references (e.g., tokens) instead of exposing direct object references in URLs or other inputs. Ensure that sensitive endpoints enforce proper authorization policies.

References

Related Issues

Tags:
IDOR
Authorization
Access Control
Anything's wrong? Let us know Last updated on February 15, 2025

This issue is available in SmartScanner Professional

See Pricing