{"id":17571,"date":"2021-10-27T13:04:47","date_gmt":"2021-10-27T07:34:47","guid":{"rendered":"https:\/\/www.varutra.com\/?p=17571"},"modified":"2022-12-02T11:50:31","modified_gmt":"2022-12-02T06:20:31","slug":"mass-assignment-vulnerability","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/","title":{"rendered":"Mass Assignment Vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Mass Assignment Vulnerability - Varutra Consulting\"><br \/>\nBefore getting into the Mass Assignment vulnerability, let us know what exactly mass assignment is and where it is used. It refers to the assignment of values to multiple variables or object properties all at once. This process reduces the burden on the developer by making their work easier. This is used in Ruby on Rails which is a server-side web application framework, NodeJS, PHP, Spring MVC, and ASP NET MVC.<\/p>\n<h3><\/h3>\n<h3><strong>What is Mass Assignment Vulnerability?<\/strong><\/h3>\n<p>It is a computer vulnerability that involves abusing an active record pattern in a web application in order to modify data items that the user usually must not be allowed to access, including granted permissions, passwords, or administrator status.<\/p>\n<p>In other words, to make developers\u2019 work easier, the software framework allows developers to use mass assignment functionality i.e., it automatically binds <a href=\"https:\/\/www.varutra.com\/http-parameter-pollution\/\">HTTP request parameters<\/a> either into program code variables or objects. This sometimes triggers the application into a vulnerable state.<\/p>\n<p>This methodology might be used by attackers to create new parameters that were never intended by the developers. The parameters created by attackers might create or overwrite new variables or objects in program code that were not intended to receive in the request. This process of manipulating mass assignment functionality to access sensitive data or cause data loss is called the Mass Assignment vulnerability.<\/p>\n<p>This vulnerability can have many\u00a0alternative names depending on the language\/framework being used:<\/p>\n<ul>\n<li><strong>Mass Assignment<\/strong>:\u00a0Ruby on Rails, NodeJS.<\/li>\n<li><strong>Auto binding<\/strong>:\u00a0ASP NET MVC, Spring MVC.<\/li>\n<li><strong>Object injection<\/strong>:\u00a0PHP.<\/li>\n<\/ul>\n<p><strong>Example<\/strong><\/p>\n<p>Consider a form for editing the account information of a user, as shown below:<\/p>\n<p><strong>Image: An example of user form<\/strong><\/p>\n<ul>\n<li>&lt;form&gt;<\/li>\n<li>&lt;input name=&#8221;userid&#8221; type=&#8221;text&#8221;&gt;<\/li>\n<li>&lt;input name=&#8221;password&#8221; type=&#8221;text&#8221;&gt;<\/li>\n<li>&lt;input name=&#8221;email&#8221; text=&#8221;text&#8221;&gt;<\/li>\n<li>&lt;input type=&#8221;submit&#8221;&gt;<\/li>\n<li>&lt;\/form&gt;<\/li>\n<\/ul>\n<p>The form is binding to the following object:<\/p>\n<ul>\n<li>public\u00a0class\u00a0User\u00a0{<\/li>\n<li>private\u00a0String\u00a0userid;<\/li>\n<li>private\u00a0String\u00a0password;<\/li>\n<li>private\u00a0String\u00a0email;<\/li>\n<li>private\u00a0boolean\u00a0isAdmin;<\/li>\n<li>\/\/Getters\u00a0&amp;\u00a0Setters<\/li>\n<li>}<\/li>\n<\/ul>\n<p>The following controller is handling the request:<\/p>\n<ul>\n<li>@RequestMapping(value\u00a0=\u00a0&#8220;\/addUser&#8221;,\u00a0method\u00a0=\u00a0RequestMethod.POST)<\/li>\n<li>public\u00a0String\u00a0submit(User\u00a0user)\u00a0{<\/li>\n<li>add(user);<\/li>\n<li>return\u00a0&#8220;successPage&#8221;;<\/li>\n<li>}<\/li>\n<\/ul>\n<p>Here is the normal request:<\/p>\n<ul>\n<li>POST\u00a0\/addUser<\/li>\n<li>&#8230; \/\/ code<\/li>\n<li>userid=testuser&amp;password=somepassword&amp;email=&#x74;&#x65;&#x73;&#x74;&#x40;<span class=\"oe_displaynone\">null<\/span>&#x75;&#x73;&#x65;&#x72;&#x2e;&#x63;&#x6f;&#x6d;<\/li>\n<\/ul>\n<p>Below is the exploit where the value of the attribute\u00a0\u201cisAdmin\u201d\u00a0of the instance of the class\u00a0\u201cUser\u201d is set:<\/p>\n<ul>\n<li>POST\u00a0\/addUser<\/li>\n<li>&#8230; \/\/ code<\/li>\n<li>userid=testuser&amp;password=somepassword&amp;email=&#x74;&#x65;&#x73;&#x74;&#x40;<span class=\"oe_displaynone\">null<\/span>&#x75;&#x73;&#x65;&#x72;&#x2e;&#x63;&#x6f;&#x6d;<strong>&amp;isAdmin=true<\/strong><\/li>\n<\/ul>\n<p>If the exploit is successful, then the \u201ctestuser\u201d in the request will be granted with admin rights.<\/p>\n<h3><\/h3>\n<h3><strong>Exploitability of Mass Assignment Vulnerability<\/strong><\/h3>\n<p>This functionality becomes exploitable in the following scenarios:<\/p>\n<ul>\n<li>When the attacker can guess common sensitive fields.<\/li>\n<li>When the attacker can access source code and review the models for sensitive fields.<\/li>\n<li>When the object with sensitive fields has an empty constructor.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Impact of Mass Assignment Vulnerability<\/strong><\/h3>\n<p>The successful exploit of mass assignment vulnerabilities provides the attacker to update object properties which should not be accessed by them, this in turn allows them to escalate privileges, modify data, and bypass security mechanisms.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Remediation<\/strong><\/h3>\n<p>To prevent this, Rails (here the Rails framework is taken as a reference) offers two class methods in the Active Record class to control\/limit access to your attributes; attr_protected (blacklist principle) and attr_accessible (whitelist principle).<\/p>\n<ul>\n<li><strong>attr_protected<\/strong>: This method requires a list of attributes that cannot be accessed for mass-assignment. To set up protected attributes, you must assign them individually.\n<ul>\n<li>Ex: attr_protected :admin<\/li>\n<li>attr_protected :last_login, :as =&gt; :admin<\/li>\n<\/ul>\n<\/li>\n<li><strong>attr_accessible<\/strong>: Another convenient way is to use the whitelist principle i.e., the attr_accessible method. This is exactly the opposite of the above attr_protected method as this method allows a list of attributes that can be accessed. All other attributes will be protected. This way, it is easier to protect attributes while adding new ones during development.\n<ul>\n<li>Ex: attr_accessible :name<\/li>\n<li>attr_accessible :name, :is_admin, :as =&gt; :admin<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Utilizing mass assignment may make the work of developers easier but it will also help attackers exploit vulnerabilities. Hence, it is important for developers to use mass assignment carefully by considering all the security measures that help to keep the web apps secure.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>References:<\/strong><\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Mass_assignment_vulnerability\">https:\/\/en.wikipedia.org\/wiki\/Mass_assignment_vulnerability<\/a><\/p>\n<p><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Mass_Assignment_Cheat_Sheet.html\">https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Mass_Assignment_Cheat_Sheet.html<\/a><\/p>\n<p><a href=\"https:\/\/www.acunetix.com\/vulnerabilities\/web\/rails-mass-assignment\/\">https:\/\/www.acunetix.com\/vulnerabilities\/web\/rails-mass-assignment\/<\/a><\/p>\n<p><a href=\"https:\/\/owasp.org\/www-community\/vulnerabilities\/PHP_Object_Injection\">https:\/\/owasp.org\/www-community\/vulnerabilities\/PHP_Object_Injection<\/a><\/p>\n<p><a href=\"https:\/\/salt.security\/blog\/api6-2019-mass-assignment\">https:\/\/salt.security\/blog\/api6-2019-mass-assignment<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><strong>Srikanth Rudrarapu,<\/strong><\/p>\n<p>Attack &amp; PenTest Team,<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Before getting into the Mass Assignment vulnerability, let us know what exactly mass assignment is and where it is used. It refers to the assignment&#8230;<\/p>\n","protected":false},"author":4,"featured_media":17574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[272],"tags":[542,396,540,543,346,541],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Mass Assignment Vulnerability For Application Framework\" \/>\n\t\t<meta property=\"og:description\" content=\"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t\t<meta property=\"article:section\" content=\"Web Application Security\" \/>\n\t\t<meta property=\"article:tag\" content=\"api security\" \/>\n\t\t<meta property=\"article:tag\" content=\"http request\" \/>\n\t\t<meta property=\"article:tag\" content=\"mass assignment vulnerability\" \/>\n\t\t<meta property=\"article:tag\" content=\"ruby on rails\" \/>\n\t\t<meta property=\"article:tag\" content=\"web application\" \/>\n\t\t<meta property=\"article:tag\" content=\"web application framework\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-10-27T07:34:47+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T06:20:31+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Mass Assignment Vulnerability For Web Application Framework\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#article\",\"name\":\"Mass Assignment Vulnerability For Application Framework\",\"headline\":\"Mass Assignment Vulnerability\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Mass-Assignment-Vulnerability.png\",\"width\":1200,\"height\":627,\"caption\":\"Mass Assignment Vulnerability\"},\"datePublished\":\"2021-10-27T13:04:47+05:30\",\"dateModified\":\"2022-12-02T11:50:31+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#webpage\"},\"articleSection\":\"Web Application Security, API Security, HTTP request, Mass Assignment Vulnerability, Ruby on Rails, Web Application, Web Application Framework\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#listItem\",\"position\":2,\"name\":\"Mass Assignment Vulnerability\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/\",\"name\":\"Mass Assignment Vulnerability For Application Framework\",\"description\":\"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/Mass-Assignment-Vulnerability.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Mass Assignment Vulnerability\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/mass-assignment-vulnerability\\\/#mainImage\"},\"datePublished\":\"2021-10-27T13:04:47+05:30\",\"dateModified\":\"2022-12-02T11:50:31+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Mass Assignment Vulnerability For Application Framework<\/title>\n\n","aioseo_head_json":{"title":"Mass Assignment Vulnerability For Application Framework","description":"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Mass Assignment Vulnerability For Application Framework","og:description":"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png","og:image:width":"1200","og:image:height":"627","article:section":"Web Application Security","article:tag":["api security","http request","mass assignment vulnerability","ruby on rails","web application","web application framework"],"article:published_time":"2021-10-27T07:34:47+00:00","article:modified_time":"2022-12-02T06:20:31+00:00","twitter:card":"summary_large_image","twitter:title":"Mass Assignment Vulnerability For Web Application Framework","twitter:description":"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"4 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#article","name":"Mass Assignment Vulnerability For Application Framework","headline":"Mass Assignment Vulnerability","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png","width":1200,"height":627,"caption":"Mass Assignment Vulnerability"},"datePublished":"2021-10-27T13:04:47+05:30","dateModified":"2022-12-02T11:50:31+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#webpage"},"articleSection":"Web Application Security, API Security, HTTP request, Mass Assignment Vulnerability, Ruby on Rails, Web Application, Web Application Framework"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#listItem","position":2,"name":"Mass Assignment Vulnerability","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/","name":"Mass Assignment Vulnerability For Application Framework","description":"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#mainImage","width":1200,"height":627,"caption":"Mass Assignment Vulnerability"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/#mainImage"},"datePublished":"2021-10-27T13:04:47+05:30","dateModified":"2022-12-02T11:50:31+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"17571","title":"Mass Assignment Vulnerability For Application Framework&nbsp;","description":"Mass Assignment Vulnerability involves abusing an active record pattern in web application framework in order to modify data items to restrict user access.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Mass Assignment Vulnerability\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase not found in image alt attribute(s). Add an image with your Focus keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}},\"score\":90},\"additional\":[{\"keyphrase\":\"Vulnerability\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/10\/Mass-Assignment-Vulnerability.png","og_image_width":"1200","og_image_height":"627","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Web Application Security","og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":"Mass Assignment Vulnerability For Web Application Framework","twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:10:12","updated":"2022-12-02 06:30:18"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/\" title=\"Web Application Security\">Web Application Security<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tMass Assignment Vulnerability\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Web Application Security","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/web-application-security\/"},{"label":"Mass Assignment Vulnerability","link":"https:\/\/www.varutra.com\/varutravrt3\/mass-assignment-vulnerability\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17571"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=17571"}],"version-history":[{"count":4,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17571\/revisions"}],"predecessor-version":[{"id":20235,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/17571\/revisions\/20235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/17574"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=17571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=17571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=17571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}