OWASP A01:2021 - Broken Access Control
Overview
What is Access Control?
Common Vulnerabilities
1. Vertical Privilege Escalation
2. Horizontal Privilege Escalation
3. Insecure Direct Object References (IDOR)
4. Missing Function Level Access Control
5. CORS Misconfigurations
Testing Methodology
1. Reconnaissance Phase
2. Authentication Bypass Testing
3. Parameter Manipulation Testing
4. HTTP Method Testing
5. Path Traversal Testing
Common Attack Vectors
1. URL Manipulation
2. Cookie/Session Manipulation
3. HTTP Header Manipulation
4. API Endpoint Discovery
Tools and Techniques
Automated Tools
Manual Testing Tools
Exploitation Examples
Example 1: IDOR in User Profiles
Example 2: Function Level Access Control Bypass
Example 3: File Access Control Bypass
Impact Assessment
Business Impact
Technical Impact
Prevention and Mitigation
1. Implement Proper Access Controls
2. Server-Side Enforcement
3. Input Validation and Sanitization
4. Security Headers
Testing Checklist
Pre-Testing
During Testing
Post-Testing
Reporting Template
Finding: Broken Access Control - [Specific Issue]
Last updated