Access Control Vulnerabilities
Access control vulnerabilities occur when users can access resources or perform actions beyond their intended permissions. AIPTx comprehensively tests authorization mechanisms.Insecure Direct Object References (IDOR)
What is IDOR?
IDOR occurs when an application uses user-supplied input to access objects directly without proper authorization checks.Testing Methodology
AIPTx tests IDOR by:- Object ID Discovery - Identifying all object references
- Permission Boundary Testing - Accessing objects across user contexts
- Parameter Manipulation - Testing IDs, UUIDs, filenames
- Response Analysis - Comparing authorized vs unauthorized access
Common IDOR Locations
| Endpoint Pattern | Risk | Example |
|---|---|---|
/api/users/{id} | High | User profile access |
/api/orders/{id} | High | Order details |
/api/documents/{id} | Critical | Sensitive documents |
/api/invoices/{id} | High | Financial data |
/download/{filename} | Critical | File download |
Example Finding
Privilege Escalation
Horizontal Privilege Escalation
Accessing resources of users with the same privilege level.Vertical Privilege Escalation
Gaining elevated privileges beyond assigned role.Role Manipulation
Testing for role modification vulnerabilities:Missing Function Level Access Control
Unprotected Admin Endpoints
| Endpoint | Expected | Actual |
|---|---|---|
/admin/dashboard | Admin only | All authenticated |
/api/admin/users | Admin only | All authenticated |
/api/admin/config | Admin only | Public |
Example Finding
Forced Browsing
Testing Areas
- Hidden admin pages
- Backup files
- Configuration files
- Debug endpoints
- API documentation
Common Paths Tested
CORS Misconfiguration
Vulnerabilities Detected
| Issue | Risk | Description |
|---|---|---|
| Wildcard origin | Critical | Access-Control-Allow-Origin: * |
| Null origin | High | Allows null origin |
| Origin reflection | High | Reflects any origin |
| Credentials with wildcard | Critical | Exposes auth cookies |
Example Finding
Path Traversal
File Access Testing
Example Finding
API Authorization Testing
REST API Testing
GraphQL Authorization
Remediation Guidelines
IDOR Prevention
IDOR Prevention
Role-Based Access Control
Role-Based Access Control
Secure CORS Configuration
Secure CORS Configuration