IDOR (Insecure Direct Object Reference)


When web applications badly implement access objects directly (files, database objetcs) with user-supplied inputs, they can be vulnerable to Insecure Direct Object Reference (IDOR) allowing attackers to access unauthorized resources.


Testers need to identify input vectors (parts of the app that accept content from the users) that could be used for direct object reference like:
In order to test IDOR vulnerabilities, testers can follow two methodologies that depend on the context:
    Testers can have accounts on the web app:
      access different objects from two accounts
      then save the values
      then try to access an user's object from another user
    They can't have accounts on the web app: try to access other user's objects by
      randomly changing the parameters
      identifyinf integer values that increment/decrement depending on the referenced object
      identifying string values that are encoded (hex, base64) depending on the referenced object

IDOR to self-XSS

While self-XSS are usually out-of-scope in bug bounty programs, and considered impactless in pentest engagements, combining an IDOR to a self-XSS can be impactful when triggering a self-XSS on another user. That is possible when there is an IDOR vulnerability when editing user's non-public info that can trigger an XSS.


Insecure direct object references (IDOR) | Web Security Academy
How-To: Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty rewards | @Bugcrowd
Last modified 1yr ago