{"id":19888,"date":"2022-10-07T18:51:38","date_gmt":"2022-10-07T13:21:38","guid":{"rendered":"https:\/\/www.varutra.com\/?p=19888"},"modified":"2022-12-01T16:53:57","modified_gmt":"2022-12-01T11:23:57","slug":"access-control-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/","title":{"rendered":"Access Control Vulnerabilities"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2022\/10\/Blog-Featured-Image-Access-Control-Vulnerabilities-By-Pralekya-H-1024x576.png\" class=\"sh-overlay-item sh-table-cell\" data-rel=\"lightcase\" \"title=\"Blog Featured Image Access Control Vulnerabilities By Pralekya H - Varutra Consulting\"\"> <\/p>\n<p>This blog aims to understand and demonstrate different access control vulnerabilities. The flow here will start with the theoretical explanation of what access control is and how different types of access controls are implemented. Then we will gradually move on to a practical demonstration of the exploitation of such vulnerabilities.<\/p>\n<p>So, first things first, what is access control? The term is self-explanatory; access control or limits the access of the requested resources for the user trying to access the same. So, access control determines whether the person trying to access a particular resource is allowed to access it or not.<\/p>\n<p>When coming to applications, Access control is implemented based on authentication and session management. Authentication is responsible for identifying whether the user is a legitimate one or not. And session management will analyze whether the same user makes consecutive requests.<\/p>\n<p>Vulnerabilities related to access control often have a critical impact depending on the nature. For example, such vulnerabilities are broken access control, privilege escalation, etc. In addition, designing and managing access controls is often a complex task.<\/p>\n<p>On the basis of the level of criticality of the functions being accessed and the user&#8217;s point of view, access controls can be classified into different types, as stated below.<\/p>\n<ol>\n<li>Vertical Access Controls<\/li>\n<li>Horizontal Access Controls<\/li>\n<li>Context-Dependent Access Controls<\/li>\n<\/ol>\n<h2><strong>Vertical Access Controls<\/strong><\/h2>\n<p>They are responsible for restricting access to sensitive functionalities which are not available to other types of users. These types of controls are generally used for limiting access to admin functionalities from the non-administrative set of users.<\/p>\n<h2><strong>Horizontal Access Controls<\/strong><\/h2>\n<p>They are used when there is a requirement to restrict resource access to only specified users allowed to access those particular resources. For example, in any banking application, it should only allow the user to view his transactions but not for any other users.<\/p>\n<h2><strong>Context-Dependent Access Controls<\/strong><\/h2>\n<p>They are responsible for limiting access to resources and functionalities based on the application&#8217;s context and user activity.<\/p>\n<p>When an attacker breaks these access controls, then this will lead to vulnerabilities related to authorization issues. There are different ways to break the access control implied upon the resources, and these ways are specific to the nature and context of the application and the functionalities being accessed.<\/p>\n<p>Different types of broken access controls are in detail are we go further with this blog.<\/p>\n<ol>\n<li>Vertical Privilege Escalation<\/li>\n<li>Horizontal Privilege Escalation<\/li>\n<li>IDOR (Insecure Direct Object Reference)<\/li>\n<li>Access Control Vulnerabilities in a Multi-Step Process<\/li>\n<li>Referrer-Based Access Control<\/li>\n<li>Location-Based Access Control<\/li>\n<\/ol>\n<h3><strong>Vertical Privilege Escalation<\/strong><\/h3>\n<p>It is when a user can access functionality that they are not authorized to access in the first place. There is a number of ways that can lead to vertical privilege escalation. Some of these methods or possibilities will be explained here, along with a demo using some of the labs available online.<\/p>\n<h4><strong>Unprotected Functionality<\/strong>:<\/h4>\n<p>Basically, privilege escalations arise when an application does not impose any protection over any sensitive or critical functionality.<\/p>\n<p>A simple example for this scenario will be any non-administrative or average user accessing a sensitive admin functionality like &#8220;delete user.&#8221;<\/p>\n<p>There are different ways an average user can try to do the same. A user might try to access (force browse) the admin URL by directly browsing to that particular URL.<\/p>\n<p>A question might arise here, how a normal will get that sensitive admin URL? Sometimes the URL can be predictable, or even in some cases, there is a change of disclosing such sensitive URL in the Robots.txt file. Even if the URL is unpredictable, someone can try to brute-force the URL using different wordlists available these days.<\/p>\n<p><strong>Parameter-Based Access Control Methods<\/strong>:<\/p>\n<p>Sometimes applications use parameters for storing users&#8217; access rights. Parameters such as hidden fields, cookies or preset query string, etc., are submitted so that, based on the value of parameters, access control decisions can be made by the applications. As access control decisions are made based on the submitted values of these parameters, this method can be very insecure because the value of these parameters can be easily manipulated.<\/p>\n<p>Now we will see a demo of this type of access control and how to bypass the same. In this scenario, we will use the id parameter to get access to the admin functionality (delete User functionality) from a non-admin user, and we will use it to delete a user.<\/p>\n<p>Step 1- Login using low-privileged user credentials. <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19891 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-11-Login-using-low-privileged-user-credentials-Access-Control-Vulnerabilities.png\" alt=\"Fig 1.1 Login using low-privileged user credentials - Access Control Vulnerabilities\" width=\"451\" height=\"151\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-11-Login-using-low-privileged-user-credentials-Access-Control-Vulnerabilities.png 559w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-11-Login-using-low-privileged-user-credentials-Access-Control-Vulnerabilities-300x100.png 300w\" sizes=\"(max-width: 451px) 100vw, 451px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.1: Login using low-privileged user credentials<\/strong><\/p>\n<p>Step 2- There is an \u201cupdate email\u201d functionality. Enter an email and capture the update email request.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-19892 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-12-Click-on-update-email.png\" alt=\"Fig 1.2 Click on update email\" width=\"508\" height=\"154\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-12-Click-on-update-email.png 501w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-12-Click-on-update-email-300x91.png 300w\" sizes=\"(max-width: 508px) 100vw, 508px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.2: Click on update email<\/strong><\/p>\n<p>Step 3 &#8211; Send the captured request to Repeater.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19893 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-13.jpg\" alt=\"Fig 1.3\" width=\"867\" height=\"489\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-13.jpg 867w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-13-300x169.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-13-768x433.jpg 768w\" sizes=\"(max-width: 867px) 100vw, 867px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.3: Send the request to the repeater<\/strong><\/p>\n<p>Step 4 &#8211; Check the response. We can see that the current user role id is 1.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19894 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-14.jpg\" alt=\"Fig 1.4\" width=\"1212\" height=\"470\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-14.jpg 1212w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-14-300x116.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-14-1024x397.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-14-768x298.jpg 768w\" sizes=\"(max-width: 1212px) 100vw, 1212px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.4: Observe the response for the current user<\/strong><\/p>\n<p>Step 5 &#8211; Now, in the request, manually add role id = 2 after the email parameter.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19895 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-15.jpg\" alt=\"Fig 1.5\" width=\"1231\" height=\"425\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-15.jpg 1231w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-15-300x104.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-15-1024x354.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-15-768x265.jpg 768w\" sizes=\"(max-width: 1231px) 100vw, 1231px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.5: Add the \u201crole id=2\u201d to the request<\/strong><\/p>\n<p>Step 6 &#8211; As the role is changed, the request is redirected to the my-account page. Check the response in the browser.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19896 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-16.jpg\" alt=\"Fig 1.6\" width=\"1242\" height=\"492\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-16.jpg 1242w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-16-300x119.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-16-1024x406.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-16-768x304.jpg 768w\" sizes=\"(max-width: 1242px) 100vw, 1242px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.6: Observe the response<\/strong><\/p>\n<p>Step 7 &#8211; Now, if we see that the Admin panel is also accessible, thus the lower privilege user is now able to access the admin functionalities leading to vertical privilege escalation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19897 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-17.jpg\" alt=\"Fig 1.7\" width=\"1266\" height=\"455\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-17.jpg 1266w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-17-300x108.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-17-1024x368.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-17-768x276.jpg 768w\" sizes=\"(max-width: 1266px) 100vw, 1266px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.7: Low privileged user got the Admin access<\/strong><\/p>\n<p>Step 8 &#8211; Now, the normal user is also able to delete another user, which is actually an admin functionality.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19899 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-18.jpg\" alt=\"Fig 1.8\" width=\"1325\" height=\"265\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-18.jpg 1325w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-18-300x60.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-18-1024x205.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-18-768x154.jpg 768w\" sizes=\"(max-width: 1325px) 100vw, 1325px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.8: Click on the Delete module<\/strong><\/p>\n<p>Step 9 &#8211; User is successfully deleted. <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19900 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-19.jpg\" alt=\"Fig 1.9\" width=\"1366\" height=\"331\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-19.jpg 1366w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-19-300x73.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-19-1024x248.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-19-768x186.jpg 768w\" sizes=\"(max-width: 1366px) 100vw, 1366px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 1.9: User got deleted successfully<\/strong><\/p>\n<h4><strong>Broken access control resulting from platform misconfiguration:<\/strong><\/h4>\n<p>Access control can also be enforced at the platform layer. It can be done by restricting access to specific URLs and HTTP methods based on user roles.<\/p>\n<p>For example: DENY: POST, \/admin\/deleteUser, managers<\/p>\n<p>The above-shown syntax will restrict the access of POST methods and the \/admin\/deleteUser URL to the users in the manager group.<\/p>\n<p>But this restriction can also be bypassed using some of the headers that are not proper in the configuration. If the application allows an alternative method for the same request, we can bypass the access control implemented on the platform layer. It is called method-based access control circumvention.<\/p>\n<h3><strong>Horizontal Privilege Escalation<\/strong><\/h3>\n<p>Here, in Horizontal privilege escalation, the user would be able to get access to the other same privileged user\u2019s data. For example, in any application, a user can see their own PII data, but in the case of horizontal privilege escalation, the user will be able to access other users\u2019 PII data as well.<\/p>\n<p>In the same way as user access other same-level users\u2019 data, if they try and access the data of higher-level privileged user data, then it will be escalated from horizontal privilege escalation to vertical privilege escalation.<\/p>\n<p>For example, if there is any \u201cid\u201d parameter in the request where data related to the user\u2019s account is being disclosed, then an attacker will try to modify that parameter and gain access to other users\u2019 data. Sometimes, this id parameter is made unpredictable so that the attacker will not be able to guess the same, but here even if it is unexpected, the attacker might get the id from elsewhere in the application where the ids are being disclosed. And also, sometimes, there is a chance that sensitive data like IDs and usernames are being disclosed in response to redirect pages.<\/p>\n<p>Moving on to the demo of Horizontal Privilege escalation, we will try to get the API key of the same-level user.<\/p>\n<p>Step 1 &#8211; Login using the normal user credentials. There is an API key on the \u201cMy account\u201d page.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19902 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-21-Access-Control-Vulnerabilities.jpg\" alt=\"Fig 2.1 Access Control Vulnerabilities\" width=\"1261\" height=\"451\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-21-Access-Control-Vulnerabilities.jpg 1261w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-21-Access-Control-Vulnerabilities-300x107.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-21-Access-Control-Vulnerabilities-1024x366.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-21-Access-Control-Vulnerabilities-768x275.jpg 768w\" sizes=\"(max-width: 1261px) 100vw, 1261px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.1: API key for the normal user<\/strong><\/p>\n<p>Step 2 &#8211; There are many posts on the home page. Find the post written by the user \u201ccarlos\u201d and view that post.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19903 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-22.jpg\" alt=\"Fig 2.2\" width=\"1133\" height=\"658\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-22.jpg 1133w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-22-300x174.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-22-1024x595.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-22-768x446.jpg 768w\" sizes=\"(max-width: 1133px) 100vw, 1133px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.2: Click on view post<\/strong><\/p>\n<p>Step 3 &#8211; Capture the request on burp and check the user id is being disclosed in the response.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19904 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-23.jpg\" alt=\"Fig 2.3\" width=\"1244\" height=\"462\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-23.jpg 1244w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-23-300x111.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-23-1024x380.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-23-768x285.jpg 768w\" sizes=\"(max-width: 1244px) 100vw, 1244px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.3: Capture the request and observe the response<\/strong><\/p>\n<p>Step 4 &#8211; Now, navigate to the \u201cMy account\u201d page and capture the request.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19905 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-24.jpg\" alt=\"Fig 2.4\" width=\"1361\" height=\"446\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-24.jpg 1361w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-24-300x98.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-24-1024x336.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-24-768x252.jpg 768w\" sizes=\"(max-width: 1361px) 100vw, 1361px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.4: Click on My account<\/strong><\/p>\n<p>Step 5 &#8211; Check that there is an \u201cid\u201d parameter in the request. <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19908 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-26.jpg\" alt=\"Fig 2.6\" width=\"841\" height=\"356\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-26.jpg 841w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-26-300x127.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-26-768x325.jpg 768w\" sizes=\"(max-width: 841px) 100vw, 841px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.5: Capture the request and observe the id<\/strong><\/p>\n<p>Step 6 &#8211; Now change the existing value of the id parameter with the id of carlos, which we captured earlier in the response of the My account page.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19908 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-26.jpg\" alt=\"Fig 2.6\" width=\"841\" height=\"356\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-26.jpg 841w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-26-300x127.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-26-768x325.jpg 768w\" sizes=\"(max-width: 841px) 100vw, 841px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.6: Change the id of carlos<\/strong><\/p>\n<p>Step 7 &#8211; Here, we are able to see the API key of carlos, who is the same level privileged user. Thus, leading to horizontal privilege escalation.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19909 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-27.jpg\" alt=\"Fig 2.7\" width=\"1259\" height=\"419\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-27.jpg 1259w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-27-300x100.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-27-1024x341.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-27-768x256.jpg 768w\" sizes=\"(max-width: 1259px) 100vw, 1259px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 2.7: API key of the carlos user<\/strong><\/p>\n<h3><strong>Horizontal to Vertical Privilege Escalation<\/strong>:<\/h3>\n<p>As stated earlier, horizontal privilege escalation can be converted into vertical privilege escalation by accessing the data of more privileged users. Let\u2019s take the above example whereby changing the id parameter was able to get access to other users\u2019 data. If the same way, by changing the id if he is able to access the administrator data, then this be a serious issue, and hence this will convert the horizontal privilege escalation into vertical privilege escalation. In the same way, if an attacker accesses the data, he might be able to access the functionalities of other users or even the admin as well.<\/p>\n<p>To demonstrate this type of privilege escalation, we try to get the password of the administrator and will login into the admin account to delete a user named carlos.<\/p>\n<p>Step 1 &#8211; Login using the low privileged user credentials.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19911 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-31.jpg\" alt=\"Fig 3.1\" width=\"1301\" height=\"452\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-31.jpg 1301w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-31-300x104.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-31-1024x356.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-31-768x267.jpg 768w\" sizes=\"(max-width: 1301px) 100vw, 1301px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.1: Login as low privileged user<\/strong><\/p>\n<p>Step 2 &#8211; On the My Account page, we can see that there is an update email and update password functionalities. The Password field is prefilled and masked.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19912 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-32.jpg\" alt=\"Fig 3.2\" width=\"1263\" height=\"667\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-32.jpg 1263w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-32-300x158.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-32-1024x541.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-32-768x406.jpg 768w\" sizes=\"(max-width: 1263px) 100vw, 1263px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.2: Click on update password<\/strong><\/p>\n<p>Step 3 &#8211; Capture the above request and send it to Repeater.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19913 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-33.jpg\" alt=\"Fig 3.3\" width=\"1012\" height=\"402\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-33.jpg 1012w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-33-300x119.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-33-768x305.jpg 768w\" sizes=\"(max-width: 1012px) 100vw, 1012px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.3: Capture the request and send it to the repeater<\/strong><\/p>\n<p>Step 4 &#8211; Observe the response. The password of the current user is disclosed in the response.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19914 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-34.jpg\" alt=\"Fig 3.4\" width=\"1229\" height=\"474\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-34.jpg 1229w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-34-300x116.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-34-1024x395.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-34-768x296.jpg 768w\" sizes=\"(max-width: 1229px) 100vw, 1229px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.4: Password of the current user is disclosed<\/strong><\/p>\n<p>Step 5 &#8211; In horizontal privilege escalation, we were replacing the id value with the same level user. Now, to escalate the same, we will change the id value to higher privilege user, i.e., administrator. We can see the administrator password in the response.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19915 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-35.jpg\" alt=\"\" width=\"1230\" height=\"518\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-35.jpg 1230w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-35-300x126.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-35-1024x431.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-35-768x323.jpg 768w\" sizes=\"(max-width: 1230px) 100vw, 1230px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.5: Change the id to administrator<\/strong><\/p>\n<p>Step 6 &#8211; Logout of the existing user login.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19916 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-36.jpg\" alt=\"Fig 3.6\" width=\"1277\" height=\"423\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-36.jpg 1277w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-36-300x99.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-36-1024x339.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-36-768x254.jpg 768w\" sizes=\"(max-width: 1277px) 100vw, 1277px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.6: Click on logout<\/strong><\/p>\n<p>Step 7 &#8211; Login using the administrator credentials that we captured earlier.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19917 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-37.jpg\" alt=\"Fig 3.7\" width=\"1296\" height=\"412\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-37.jpg 1296w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-37-300x95.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-37-1024x326.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-37-768x244.jpg 768w\" sizes=\"(max-width: 1296px) 100vw, 1296px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.7: Login using admin credentials<\/strong><\/p>\n<p>Step 8 &#8211; We have successfully logged into the administrator account. Now, navigate to the admin panel.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19918 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-38.jpg\" alt=\"Fig 3.8\" width=\"1289\" height=\"535\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-38.jpg 1289w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-38-300x125.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-38-1024x425.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-38-768x319.jpg 768w\" sizes=\"(max-width: 1289px) 100vw, 1289px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.8: Successfully logged into the admin console<\/strong><\/p>\n<p>Step 9 &#8211; Delete the user named carlos.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19919 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-39.jpg\" alt=\"Fig 3.9\" width=\"1314\" height=\"347\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-39.jpg 1314w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-39-300x79.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-39-1024x270.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-39-768x203.jpg 768w\" sizes=\"(max-width: 1314px) 100vw, 1314px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.9: Click on delete<\/strong><\/p>\n<p>Step 10 &#8211; User is successfully deleted.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19920 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/10\/Fig-310.jpg\" alt=\"Fig 3.10\" width=\"1323\" height=\"365\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-310.jpg 1323w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-310-300x83.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-310-1024x283.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Fig-310-768x212.jpg 768w\" sizes=\"(max-width: 1323px) 100vw, 1323px\" \/><\/p>\n<p style=\"text-align: center\"><strong>Fig 3.10: User got deleted successfully<\/strong><strong>\u00a0<\/strong><\/p>\n<h3><strong>IDOR (Insecure Direct Object Reference)<\/strong><\/h3>\n<p>IDOR is another sub-group of access control vulnerability; this vulnerability emerges when user-supplied input is used by the application to directly access the objects. An attacker might take advantage of the same and will modify the inputs to get direct unauthorized access. Although IDOR is an implement error from a pool of other implementation errors, it is more popular than the rest because of its listing in <a href=\"https:\/\/www.varutra.com\/web-services-security-testing\/\">OWASP<\/a> Top Ten in the year 2007.<\/p>\n<p>Direct reference in IDOR can be to anything like; it can be directly referenced to database objects or even to the static file, which is directly stored on the server-side filesystem.<\/p>\n<h3><strong>Access Control Vulnerabilities In a Multi-Step Process<\/strong>:<\/h3>\n<p>There are various functionalities in the application where the process is submitted in multiple steps. For example, there are many applications that use incremental forms to commit changes to users\u2019 data or even to access existing data. In the case of these incremental forms, sometimes the access controls are implemented in the initial step only. So, an attacker might try and alter the content in the final submission, which will ultimately save the final data altered that the attacker has provided.<\/p>\n<h3><strong>Referrer-Based Access Control<\/strong>:<\/h3>\n<p>Some of the applications use access controls that are based on the Referrer header of the HTTP request. The referrer header is basically used to indicate where the page is coming from, i.e., the Referrer header is always the previous URL of the page. In a few of the applications, the restriction to some critical or sensitive functionalities is based on the referrer header. For example, if a user wants to access a URL \u201c\/admin\/dashboard,\u201d then the application will first check the referrer header of the request and will validate whether the value of the referrer is \u201c\/admin\u201d or not. This way, the access is granted after validating the referrer of the request. In such a type of access control, the attacker will alter the referrer header and gain unauthorized access to such sensitive pages and functionalities.<\/p>\n<h3><strong>Location-Based Access Control<\/strong>:<\/h3>\n<p>These days websites are also enforcing access controls based on the geolocation of the user. In cases, whether banking applications or entertainment applications, where depending upon the state legislation, only the approved content and functionalities will be available to the user. These controls can be bypassed using web proxies, VPNs, or manipulation of the client-side geolocation mechanisms.<\/p>\n<h2><strong>Mitigation for Access Control Vulnerabilities<\/strong>:<\/h2>\n<ol>\n<li>Until and unless public access is required for any resource, by default, deny access to resources.<\/li>\n<li>Mandatory define the access for each resource at the code level.<\/li>\n<li>Test all the access controls properly to check whether they are working properly or if there are any loopholes in the implementation.<\/li>\n<li>Use single application-wise access control wherever possible.<\/li>\n<li>Don\u2019t rely only on obfuscation; implement a proper access control mechanism.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><strong>Reference Links:<\/strong><\/h2>\n<p>PortSwigger<\/p>\n<p class=\"LC20lb MBeuO DKV0Md\">InfoSec Write-ups<\/p>\n<p>&nbsp;<\/p>\n<p>Author:<\/p>\n<p><strong>Pralekya H.<\/strong><\/p>\n<p>Attack &amp; Pentest Dept.<\/p>","protected":false},"excerpt":{"rendered":"<p>This blog aims to understand and demonstrate different access control vulnerabilities. The flow here will start with the theoretical explanation of what access control is&#8230;<\/p>\n","protected":false},"author":4,"featured_media":19921,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[270,277,261,1,278,263,272],"tags":[694,693,340],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Understanding the different access control vulnerabilities &amp; how different types of access controls are implemented by the exploitation of such vulnerabilities.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Access Control Vulnerabilities\" \/>\n\t\t<meta property=\"og:description\" content=\"Understanding the different access control vulnerabilities &amp; how different types of access controls are implemented by the exploitation of such vulnerabilities.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/\" \/>\n\t\t<meta property=\"article:tag\" content=\"access control\" \/>\n\t\t<meta property=\"article:tag\" content=\"access control vulnerabilities\" \/>\n\t\t<meta property=\"article:tag\" content=\"vulnerabilities\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-10-07T13:21:38+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-01T11:23:57+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Access Control Vulnerabilities\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Understanding the different access control vulnerabilities &amp; how different types of access controls are implemented by the exploitation of such vulnerabilities.\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#article\",\"name\":\"Access Control Vulnerabilities\",\"headline\":\"Access Control Vulnerabilities\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Blog-Featured-Image-Access-Control-Vulnerabilities-By-Pralekya-H.png\",\"width\":2240,\"height\":1260,\"caption\":\"   Varutra Consulting\"},\"datePublished\":\"2022-10-07T18:51:38+05:30\",\"dateModified\":\"2022-12-01T16:53:57+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#webpage\"},\"articleSection\":\"Data Leakage, Data Privacy, Ethical Hacking, General, Network Pentesting, Password Security, Web Application Security, Access Control, Access Control Vulnerabilities, vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#listItem\",\"position\":2,\"name\":\"Access Control Vulnerabilities\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/\",\"name\":\"Access Control Vulnerabilities\",\"description\":\"Understanding the different access control vulnerabilities & how different types of access controls are implemented by the exploitation of such vulnerabilities.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Blog-Featured-Image-Access-Control-Vulnerabilities-By-Pralekya-H.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#mainImage\",\"width\":2240,\"height\":1260,\"caption\":\"   Varutra Consulting\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/access-control-vulnerabilities\\\/#mainImage\"},\"datePublished\":\"2022-10-07T18:51:38+05:30\",\"dateModified\":\"2022-12-01T16:53:57+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Access Control Vulnerabilities<\/title>\n\n","aioseo_head_json":{"title":"Access Control Vulnerabilities","description":"Understanding the different access control vulnerabilities & how different types of access controls are implemented by the exploitation of such vulnerabilities.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Access Control Vulnerabilities","og:description":"Understanding the different access control vulnerabilities &amp; how different types of access controls are implemented by the exploitation of such vulnerabilities.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/","article:tag":["access control","access control vulnerabilities","vulnerabilities"],"article:published_time":"2022-10-07T13:21:38+00:00","article:modified_time":"2022-12-01T11:23:57+00:00","twitter:card":"summary_large_image","twitter:title":"Access Control Vulnerabilities","twitter:description":"Understanding the different access control vulnerabilities &amp; how different types of access controls are implemented by the exploitation of such vulnerabilities.","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"11 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#article","name":"Access Control Vulnerabilities","headline":"Access Control Vulnerabilities","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Blog-Featured-Image-Access-Control-Vulnerabilities-By-Pralekya-H.png","width":2240,"height":1260,"caption":"   Varutra Consulting"},"datePublished":"2022-10-07T18:51:38+05:30","dateModified":"2022-12-01T16:53:57+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#webpage"},"articleSection":"Data Leakage, Data Privacy, Ethical Hacking, General, Network Pentesting, Password Security, Web Application Security, Access Control, Access Control Vulnerabilities, vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#listItem","position":2,"name":"Access Control Vulnerabilities","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/","name":"Access Control Vulnerabilities","description":"Understanding the different access control vulnerabilities & how different types of access controls are implemented by the exploitation of such vulnerabilities.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/10\/Blog-Featured-Image-Access-Control-Vulnerabilities-By-Pralekya-H.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#mainImage","width":2240,"height":1260,"caption":"   Varutra Consulting"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/#mainImage"},"datePublished":"2022-10-07T18:51:38+05:30","dateModified":"2022-12-01T16:53:57+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"19888","title":"Access Control Vulnerabilities","description":"Understanding the different access control vulnerabilities &amp; how different types of access controls are implemented by the exploitation of such vulnerabilities.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Access Control Vulnerabilities\",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use more focus keyphrases in your H2 and H3 subheadings!\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Vulnerabilities\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Access Control\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2022-10-07 13:14:39","updated":"2022-12-01 11:37:13"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/data-leakage\/\" title=\"Data Leakage\">Data Leakage<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tAccess Control Vulnerabilities\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Data Leakage","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/data-leakage\/"},{"label":"Access Control Vulnerabilities","link":"https:\/\/www.varutra.com\/varutravrt3\/access-control-vulnerabilities\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/19888"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=19888"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/19888\/revisions"}],"predecessor-version":[{"id":20151,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/19888\/revisions\/20151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/19921"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=19888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=19888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=19888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}