Username Hash Found
Reference
Plugin Id: 10057 | CWE: 284
Remediation
- Use indirect object references: Replace direct username hashes with session-specific indirect references or UUIDs.
- Implement authorization checks: Add proper authorization validation before accessing any user-specific resources.
- Remove unnecessary exposure: Eliminate username hashes from responses unless absolutely required for functionality.
- Use per-user tokens: Generate unique, non-predictable tokens for user identification instead of username-based hashes.
- Regular security testing: Conduct IDOR testing to ensure proper access controls are in place.
About
Username hash discovery occurs when applications expose hashed usernames in responses, URLs, or API calls. This can indicate potential Insecure Direct Object Reference (IDOR) vulnerabilities where attackers might manipulate these hashes to access other users’ data or functionality.
Risks
Medium Username hash exposure can enable IDOR attacks, allowing unauthorized access to other users’ accounts, data, or functionality by manipulating predictable user identifiers in requests.