HawkScan Test Info for Username Hash Found

Username Hash Found

Reference

Plugin Id: 10057 | CWE: 284

Remediation

  1. Use indirect object references: Replace direct username hashes with session-specific indirect references or UUIDs.
  2. Implement authorization checks: Add proper authorization validation before accessing any user-specific resources.
  3. Remove unnecessary exposure: Eliminate username hashes from responses unless absolutely required for functionality.
  4. Use per-user tokens: Generate unique, non-predictable tokens for user identification instead of username-based hashes.
  5. Regular security testing: Conduct IDOR testing to ensure proper access controls are in place.

About

Username hash discovery occurs when applications expose hashed usernames in responses, URLs, or API calls. This can indicate potential Insecure Direct Object Reference (IDOR) vulnerabilities where attackers might manipulate these hashes to access other users’ data or functionality.

Risks

Medium Username hash exposure can enable IDOR attacks, allowing unauthorized access to other users’ accounts, data, or functionality by manipulating predictable user identifiers in requests.