StackHawk Documentation StackHawk Logo HawkDocs

No results found

Try different keywords or check your spelling

Search documentation

Find guides, API references, and more

esc
Back to Index

API Broken Authorization

Reference
Plugin ID: 40050 CWE: 285 WASC: 2 High Active Access Control

Remediation

To mitigate API Broken Authorization vulnerabilities, implement the following security measures:

  1. Proper Access Controls: Implement comprehensive authorization checks at every API endpoint. Verify that users have the appropriate permissions before allowing access to resources.

  2. Role-Based Access Control (RBAC): Implement a robust RBAC system that clearly defines user roles and their associated permissions for API operations.

  3. Parameter Validation: Validate all authorization-related parameters and headers. Do not rely solely on client-provided authorization information.

  4. Consistent Authorization: Apply authorization checks consistently across all API endpoints and ensure they cannot be bypassed through alternative access methods.

About

API Broken Authorization vulnerabilities occur when API endpoints fail to properly verify user permissions before granting access to resources or functionality. This corresponds to OWASP API Security Top 10 2023 issues related to authorization failures.

Risks

Broken Authorization in APIs can result in:

  • Unauthorized access to sensitive data and functionality
  • Privilege escalation attacks
  • Data modification by unauthorized users
  • Bypass of business logic controls
  • Potential for complete system compromise

Your privacy settings

We use first and third party cookies to ensure that we give you the best experience on our website and in our products.