OWASP A01:2021 - Broken Access Control

Overview

Broken Access Control is the #1 vulnerability in the OWASP Top 10 2021, moving up from the 5th position in 2017. This category represents failures in enforcing policies such that users cannot act outside of their intended permissions.

Risk Rating: High CWE Mappings: 34 CWEs mapped to this category Prevalence: 94% of applications tested had some form of broken access control

What is Access Control?

Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of data, or performing business functions outside the user's limits.

Common Vulnerabilities

1. Vertical Privilege Escalation

  • Description: Lower-privileged users gain access to higher-privileged functions

  • Example: Regular user accessing admin panel via direct URL manipulation

2. Horizontal Privilege Escalation

  • Description: Users access resources belonging to other users at the same privilege level

  • Example: User A accessing User B's account data by changing account ID parameter

3. Insecure Direct Object References (IDOR)

  • Description: Application provides direct access to objects based on user-supplied input

  • Example: /download?file=../../../etc/passwd

4. Missing Function Level Access Control

  • Description: UI hides functions but server-side access control is missing

  • Example: Admin functions accessible via direct API calls

5. CORS Misconfigurations

  • Description: Overly permissive Cross-Origin Resource Sharing policies

  • Example: Access-Control-Allow-Origin: * with credentials

Testing Methodology

1. Reconnaissance Phase

  • Identify user roles and access levels

  • Map application functionality and endpoints

  • Analyze client-side code for hidden functions

  • Review API documentation if available

2. Authentication Bypass Testing

3. Parameter Manipulation Testing

4. HTTP Method Testing

5. Path Traversal Testing

Common Attack Vectors

1. URL Manipulation

  • Direct access to admin URLs: /admin, /administrator, /manage

  • Parameter tampering: user_id=1user_id=2

  • Path traversal: ../../../sensitive_file

  • Role manipulation: role=userrole=admin

  • Privilege escalation via session data

  • JWT token manipulation

3. HTTP Header Manipulation

4. API Endpoint Discovery

  • Swagger/OpenAPI endpoints: /api/docs, /swagger-ui

  • GraphQL introspection queries

  • REST API fuzzing for undocumented endpoints

Tools and Techniques

Automated Tools

  • Burp Suite Professional: Access control testing extensions

  • OWASP ZAP: Access Control Testing add-on

  • AuthMatrix: Burp extension for access control testing

  • Autorize: Burp extension for authorization testing

Manual Testing Tools

Exploitation Examples

Example 1: IDOR in User Profiles

Example 2: Function Level Access Control Bypass

Example 3: File Access Control Bypass

Impact Assessment

Business Impact

  • Data Breach: Unauthorized access to sensitive customer data

  • Financial Loss: Unauthorized transactions or system manipulation

  • Compliance Violations: GDPR, HIPAA, PCI-DSS violations

  • Reputation Damage: Loss of customer trust

Technical Impact

  • Complete system compromise

  • Data exfiltration

  • Privilege escalation

  • Lateral movement within network

Prevention and Mitigation

1. Implement Proper Access Controls

  • Deny by default principle

  • Implement role-based access control (RBAC)

  • Use attribute-based access control (ABAC) for complex scenarios

2. Server-Side Enforcement

3. Input Validation and Sanitization

4. Security Headers

Testing Checklist

Pre-Testing

During Testing

Post-Testing

Reporting Template

Finding: Broken Access Control - [Specific Issue]

Severity: High/Critical CVSS Score: [Calculate based on impact]

Description: [Detailed description of the access control failure]

Steps to Reproduce:

  1. [Step-by-step reproduction]

  2. [Include request/response examples]

  3. [Screenshots if applicable]

Impact: [Business and technical impact]

Recommendation: [Specific remediation steps]

References:

  • OWASP Top 10 A01:2021

  • CWE-22: Path Traversal

  • CWE-639: Authorization Bypass


This reference guide is part of a comprehensive OWASP Top 10 penetration testing series. For more detailed exploitation techniques and advanced testing methodologies, refer to the complete blog series.

Last updated